Apple remotely disables feature in Zoom conferencing app after webcam scare – CNET

People typically are made fun of for covering up their webcams. But maybe not anymore.

Josh Lowensohn/CNET

Apple's sent out a quiet security update to Mac computer users two days after a security researcher detailed a security flaw in the web conferencing software maker Zoom's software that could remotely turn on a person's webcam. The update, removed a feature that quickly connected people to conference calls.

Zoom's software installs a web server on user's computers, designed to quickly launch Zoom's software when users click a link. It also re-installs Zoom's software if it's been removed. That server is what Apple's update removed, according to TechCrunch, which reported on the update earlier. 

"We're  happy to have worked with Apple on testing this update to resolve the  web server issue. We appreciate our users' patience as we continue to  work through addressing their concerns," Zoom spokesperson Priscilla Barolo told CNET, confirming the TechCrunch report.    

Apple  didn't respond to a request for comment. 

The move marks the latest twist in the fallout after security researcher Jonathan Leitschuh <a href="" rel="noreferrer noopener" target="_blank">detailed a shocking security flaw</a> that potentially allows an attacker to turn on a Mac computer's webcam without warning. 

In a blog post Tuesday, Zoom said it planned to <a href="" rel="noreferrer noopener" target="_blank">disable the web server feature</a>, which was originally designed to make it easier for users to join meetings without extra clicks. &quot;We are stopping the use of a local web server on Mac devices,&quot; the company said. 

<strong>Originally published at 4:40 p.m. PT</strong> <br />Updated at 7:20 p.m. with Zoom comment and confirmation. 


                                                                                           <a href=";creative=395261&amp;creativeASIN=B07HXTCZ3T&amp;linkCode=asn&amp;ascsubtag=ag%3A085d0a21-a929-490d-9b73-bee711bea99f%7Cvg%3A___VIEW_GUID___%7Cst%3Adtp" rel="noreferrer noopener" target="_blank">    </a>

Read More – Source
[contf] [contfnew]

[contfnewc] [contfnewc]

Related Posts