Is the Zoom App Safe to Use? An Overview of Its Security Flaws, Updates and Helpful Tips in Using It

Is the Zoom App Safe to Use? An Overview of Its Security Flaws, Updates and Helpful Tips in Using It

The Zoom app was the go to program for conferences ever since the pandemic hit. With businesses and schools closing down during the first few months, video conferences rose, and so was the demand for a platform that can host up to a hundred users easily. However, Zoom was plagued with numerous security issues that raised red flags. But with the company providing one Zoom security update after the other, can it be said that this program is already safe to use? 

Zoom is the largest video conferencing platform

Zoom is the largest video conferencing platform (photo credit: TrustRadius)

Zoom’s Security Flaws 

There were several security flaws that were found in this program during the first few months of its launch. As with any program, security is an important part of the software since it offers protection to the user. What are these flaws you ask? 

  • Zoom Bombing. 
    During the first few months of the application, conferences were interrupted by random people who sent inappropriate content to the room. Although the host of the conference will be able to remove the said individuals, it was possible for them to come back using a different ID.

    Different efforts were taken as attempts to prevent Zoom Bombing, such as requesting meeting attendees to provide a password before joining or having those attendees held in waiting rooms before they're able to join the meeting. Some even went to the extent of trying to criminalize the act of Zoom Bombing in their city. However, these efforts were found mostly ineffective by a group of researchers at Boston and Binghamton Universities.

    The thing that increases the risk of Zoom Bombing and lowers the effectiveness of all of its prevention methods is its source itself, which is that these attacks usually come from attendees that were authorized into the meeting.

    The study recommended one way, however, to try to isolate the incidents, which is by sending each attendee of the meeting a separate invite link. While this is a good solution to isolate the attacker through their individual links, this solution is not practical for zoom meetings with large numbers of attendees such as webinars.

  • Missing End-to-End Encryption. 
    The lack of proper end-to-end encryption by Zoom had been questioned by many, especially those who are experts in security. Although the company stated that their end-to-end encryption was different from what other companies have, the problem was that the decryption was happening on the server side. This means that those who are running the network will be able to access files from the users.
    However, the Federal Trade Commission stated recently that the company was actually misleading their users by engaging in deception with regards to the security of the platform. That said, Zoom is required to undergo reviews of their internal as well as external securities every two years. They are also required to have a program for managing vulnerabilities. It was also stipulated that Zoom should provide their customers with a two-step authentication which they are now doing. 
  • Sneaky Installer. 
    Have you ever experienced a bug suddenly disrupting your computer’s function? Or that you found a program on your gadget that you did not install on your own? Well, it seems that the Zoom application can easily take over your own privileges on your gadget in order to install random software for suspicious purposes. This was called out by the experts as well as companies that were using the program too. 
  • Email and Photo Leak.
    Users of the program, such as Dutch users, found that their emails and photos were stored in a folder that is accessible to the public. For a platform with millions of users, this left their personal information vulnerable to anyone. This is a huge security leak and one that Zoom was tasked to fix. 
  • Zoom's Keybase poses a threat.
    Keybase is a chat app that has an encrypted verification system owned by Zoom. While the app was supposed to provide its users with an extra layer of security and protection online, last May, in 2020, a user discovered a major security flaw in Keybase that compromises the privacy of all of its users.
    The app's client failed to clear or delete all the cached pictures leaving them in Cleartext Storage which made them accessible to attackers who would be able to gain access to the uses' local files.
  • Phishing Scams.
    Similar to the previous threat, Zoom users were the victim of attacks that targeted their usernames and passwords through what is known as phishing emails and text messages.

    These emails and messages are known to scam different platforms' users out of their credentials, not just Zoom. The email would warn you that you were logged out of a meeting that you don't remember logging into in the first place, or warn you that "Your account has been suspended" for no reason that you can recognize.

    The message would continue to offer you, the user, a link to help you proceed with the meeting or terminate your account suspension. Through this link, a fake Zoom-login-like page would open to get your username and password and, from there, your account is stolen.

The Latest on Zoom Security Update

The latest on Zoom security update

The latest on Zoom security update (photo credit:

Zoom was given up to 90 days to address the security issues that it had. Now that the given deadline has passed, we had to ask what’s the latest on this program? According to Tom’s Guide, there were several updates that the company has made to its platform that fixed the previous issues that it had. Here are a few worth noting. 

Combat Zoom Bombings 

It appears that Zoom has finally made two features to address the issue of random people popping up in conferences to disrupt them. The company has issued two additional features that were designed to address this problem. The first one was referred to as “Suspend Participant Activities”. This feature puts the power on the host to pause the ongoing conference, remove those that were disrupting the activity, then resume after. The second feature was dubbed as “Report by Participants” where the members of the group call were able to report those who were disturbing the conference. Hopefully, these new add-ons will be able to make the video conferences more secure to the guests. 

End-to-End Encryption 

After months of silence from Zoom, the company announced in October that their end-to-end encryption will undergo beta testing in the third week of October. On October 27, the feature was finally launched but it was only limited to the Android platform since they had to wait for an approval from the tech giant, Apple. 

This encryption feature was primarily for Zoom’s customers who paid for their subscription, but it appears that non-profit groups, such as in a school setting, may receive this feature since they are known. Is it possible that they will roll out this feature for those who are using the platform for free? It remains to be seen. 

Keybase Update Fixes Privacy Issue

While this issue is not directly related to the Zoom app itself, Keybase has been purchased and owned by Zoom since 2020. Also, Keybase is being used as a verification method for social media since it is an encrypted system.

This is why it is important to mention that as of January 2021, Zoom has resolved the security issue that compromised Keybase's users cached pictures even after the user has deleted them. The latest update for Keybase, which was released by Zoom early this January, included the solution that fixed the old flaw.

Updated Security for Private Rooms in Zoom

A few months ago, the web interface of this video conferencing platform was down because it appeared that anyone can easily guess the six-digit PINs for these rooms by anyone. This was one of the reasons why many were able to bomb private conferences easily. Tom Anthony, a security researcher from Britain, wrote about how he was able to crash a Zoom conference within half an hour. The good news is that this was already fixed which is one less problem to worry about in this platform. 

Zoom Security Tips to Consider for Safe Zoom Usage

A Zoom meeting underway

A Zoom meeting underway (photo credit:

With the latest Zoom security update in place, the question now is whether the application is finally safe to use by everyone. For the most part, this video conference platform is relatively safe to download and use, as long as you are not using it to talk about sensitive matters, such as your company’s secrets and such. This is still a good platform for virtual get-togethers especially during this pandemic. Even schools are enjoying this platform’s advantage of hosting up to a hundred people at the same time which other video conferencing programs have yet to achieve. 

But after all that is said and done, it still pays to be more aware of your personal security when using this platform. As a matter of fact, there are several Zoom security best practices that you should follow such as:

  • Use a web browser when joining meetings. Instead of downloading the Zoom software for desktop, it is best that you open it from the web browser. One reason behind this is this version typically receives updates or enhancements faster compared to the desktop platform. According to Kaspersky, the browser version of Zoom doesn’t require permissions unlike when installing the platform directly into your device. This means that it is less vulnerable to Zoom security issues. When you join a meeting via a link, there will be a new tab that will be opened where you will be prompted to install the software. Check the fine print and locate the link where you can join through your choice of browser. 
  • Use password. Another example of Zoom security tips is to have your guests sign in using a password. This is applicable if you will be the host of a private conference to avoid being rudely interrupted by unknown individuals. This way, you won’t have to deal with the constant Zoom bombing that plagued users during the first few months of using this new online video conferencing platform. 
  • Set up authentication. The two-step authentication was finally rolled out by Zoom to help make their customers’ account more secure. If these Zoom security settings are activated, it will be difficult for potential hackers to get into your personal accounts even if they do have your addresses for your emails as well as passwords. This authentication process will have to pass a second layer of authentication such as a smartphone to be able to open the account. More of this will be discussed below. 
  • Avoid suspicious links
    While Zoom, as an app, can make every possible effort to stop various threats on its users by providing new security features and various layers of authentications, the one thing that lies within the users' responsibility to avoid is Phishing Scams.

    This is why it is crucial that you, as a user of Zoom and other apps and platforms, be aware of these types of attacks and scams in order to be able to avoid them.

    Experts' advice is that users must always double check the source of an email that contains a link before clicking on or tapping on that link.

    For example, if you weren't recently in a Zoom meeting and got a link to "re-join" your meeting, don't fall for that and don't open that link. If you have no reason to suspect that your account is worthy of suspension, then don't respond to any email informing you that your account is being suspended whether this email is regarding Zoom or any other platform or application for that matter.

Although the concept of Zoom was a great idea, especially since it allows a hundred users to converge in a single room virtually, it was prone to getting hacked in various ways. There have been reports already that these hackers have already created fake domains that are related to Zoom plus malware for the program too. 

On a good note, if the company behind Zoom is able to find these flaws and address them as quickly as possible, there is a good chance that they will be able to keep their platform safe and secure for its users. 

Setting Up the Zoom Two-Factor Authentication System

If this is your first time to set this up, you will need two things: your laptop or your desktop and your smartphone. See to it that the authenticator program is already installed in your device before you proceed. 

Here are the steps you will need to follow: 

  1. Sign in into your account via the web browser on your desktop. 
  2. On the upper right portion of your monitor select My Account. 
  3. Choose Profile which you will find on the left portion of your navigation bar. 
  4. Select the Two-Factor Authentication which you will find almost at the end of your screen to activate it. 

You will then have to decide what your second layer of authentication will be. Will it be via SMS, an Authentication program, or you can use both. 

Via Authentication Application

Like it was mentioned before, you will need to ensure that you have your authenticator application already downloaded and installed on your mobile device, regardless of whether it is brand-new or refurbished, before you proceed with the authentication process. Once done, you can do the following:

  • Choose the Authentication App on your profile page then input your password. 
  • You will have to create a new entry in the authenticator program in your mobile device. 
  • Move your smartphone’s camera towards the QR code that will appear on the web page of Zoom on your computer. 
  • You will need to input the temporary code provided by the authenticator program on your device to your computer to complete the registration. 

Setting up Mobile Number

It does pay to have a multiple authentication process to go through especially with platforms such as Zoom where there is the danger of getting hacked into. To set up your mobile number for Zoom, you will need to do these steps: 

  • Choose SMS then proceed with typing your password for Zoom. 
  • You should then input your mobile number as well as the country code. 
  • You will receive a temporary code again which consists of six numbers. These numbers must be typed on the web page in your computer. 

Zoom Security Still Needs a Lot of Work 

Zoom is a promising video conferencing platform, there is no doubt about that. The very idea of being able to connect to multiple individuals without the program crashing is exceptional already. After all, video conferencing applications such as Facebook, Skype, and Google’s Hangouts have limited capacity. In these times when social distancing is being practiced and many are working from home, Zoom really does shine the most. 

However, the security flaws that it has is disconcerting, especially when previous reports have stated that anyone can easily enter a conference to drop unwanted GIFs, or send malwares via links in the chat room. Although the company is trying their best to fix the problem one by one via a Zoom security update, there is still much to do to make this platform a secure space for everyone. Even when you buy refurbished phones UK from sites like QwikFone to use for Zoom alone, you will still need to follow the Zoom security best practices as much as possible for your own safety. 

It may take some time before we see all the flaws in Zoom to be corrected, but on a good note, they are amenable to making these changes based on customer feedback and the reviews of the security experts. 

Is this platform safe? For regular video get-togethers and online learning, this application may work just fine. However, for businesses or high-profile gatherings where sensitive information needs to be discussed, you might want to look for other options instead. Even with the multiple authentication system that Zoom has rolled out for added security, it would be better to try a more secure system that has been developed by trusted brands like Microsoft and Google. 


Find Us on Facebook

Featured Category

Buying Guide

Dec 03, 2019


Dec 03, 2019


Dec 03, 2019


Dec 03, 2019


Dec 03, 2019


Dec 03, 2019


Dec 03, 2019