{"title":"Can Zoom video conferencing tool be misused for real‐time cybercrime?","authors":"M. Mohanty, Riyanka Jena, Priyanka Singh","doi":"10.1002/WFS2.1419","DOIUrl":null,"url":null,"abstract":"Video conferencing tool Zoom has boomed during this COVID pandemic situation. Although Zoom has been very useful for facilitating work‐from‐home and study‐from‐home arrangements, its misuse can result in cybercrime cases. The world has already seen the adverse effect of a Zoom‐related cybercrime, Zoombombing. In this article, we discuss how Zoom can also be misused for launching real‐time cybercrime, such as piracy and real‐time pornography. The end‐to‐end encryption proposed to be used by Zoom can further complicate these cybercrime issues. The existing mechanisms may not be sufficient in dealing with these real‐time issues. New mechanisms need to be found.This article is categorized under:Digital and Multimedia Science > Multimedia Forensics","PeriodicalId":75325,"journal":{"name":"WIREs. Forensic science","volume":null,"pages":null},"PeriodicalIF":2.1000,"publicationDate":"2021-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1002/WFS2.1419","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"WIREs. Forensic science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1002/WFS2.1419","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"CRIMINOLOGY & PENOLOGY","Score":null,"Total":0}
引用次数: 1
Abstract
Video conferencing tool Zoom has boomed during this COVID pandemic situation. Although Zoom has been very useful for facilitating work‐from‐home and study‐from‐home arrangements, its misuse can result in cybercrime cases. The world has already seen the adverse effect of a Zoom‐related cybercrime, Zoombombing. In this article, we discuss how Zoom can also be misused for launching real‐time cybercrime, such as piracy and real‐time pornography. The end‐to‐end encryption proposed to be used by Zoom can further complicate these cybercrime issues. The existing mechanisms may not be sufficient in dealing with these real‐time issues. New mechanisms need to be found.This article is categorized under:Digital and Multimedia Science > Multimedia Forensics