Popular video conferencing app Zoom stated in a blog post earlier this month that it had more than 300 million daily users. However, it has now updated the blog post, admitting a mistake in counting.
Zoom announced today a new set of updates designed to beef up security and privacy of its video conferencing service. Among other things, Zoom now supports encryption and adds more call controls.
COVID-19 has surged Zoom's numbers, with the firm's daily users increasing from 10 million last year to 200 million in June. However, the company is facing backlash over security concerns.
The video conferencing company has faced backlash recently after security and privacy issues were reported within the software. It is currently enacting a 90-day feature freeze to fix the issues.
In a bid to alleviate concerns resulting from the vulnerabilities being reported recently, Zoom will now let paying customers decide which countries their calls get routed through.
Following leud incidents during home-based lessons, Singapore has stopped teachers from using Zoom. The company is currently focusing on fixing privacy and security vulnerabilities.
The video conferencing software has seen a surge in users resulting from lockdowns across the globe. Resultantly, millions globally have turned to the app to work and socialize during the crisis.
In a drastic change to prevent trolling, Zoom will require users to enter passwords via Meeting ID, since these can be easily guessed or reused. The change will be functional as of April 5.
Following reports detailing Zoom's vulnerabilities, several state AGs are seeking information from the company. The video conferencing service has become popular in the wake of the COVID-19 crisis.
Elon Musk's rocket company has banned its workers from using Zoom citing privacy concerns. Due to the crisis, Zoom and other digital communication services have seen a surge in users.
A new vulnerability has been discovered in Zoom's Windows client that can allow hackers to steal users' Windows credentials through the way of a UNC injection through the app's chat.