Earlier this week, a security researcher disclosed an exploit showing that websites could use Zoom’s video chat software to start your webcam and record without your permission. Now Apple is removing Zoom’s web server from all Macs automatically.

Zoom, a video chat service wanted to provide convenience. It designed its software to join a video chat and start your webcam just by clicking on a link. But then Safari, Apple’s browser, released an update to prevent exactly that behavior. Instead, you would confirm that you wanted to start your webcam.

So Zoom decided to work around that problem and installed a local web server on Macs that could bypass the security check, in the name of convenience. That entire concept is problematic, and as shown by Jonathan Leitschuh, a bad actor could easily create a website that would autojoin you to a call and start your webcam.

Worse yet, uninstalling Zoom from your Mac doesn’t remove the web server. Which meant it was easy to force a reinstall of the software, again without your permission.

Zoom promised to make changes and apparently, Apple stepped in to help. Apple released a silent update that removes Zoom’s web server from your Mac. The process is automated, and you won’t need to do anything. That should keep anyone who likes Zoom safer on MacOS. However, the autojoin feature still affects Windows. [TechCrunch]

RELATED: Zoom Lets Websites Start Filming You Without Your Consent, Even on Windows

In Other News:

  • Microsoft’s latest Insider update includes passwordless sign-in: Microsoft is moving forward with Insider testing, and the latest update includes some interesting additions. In addition to expanding Your Phone to work with more Surface devices, the company is testing a new passwordless sign-in option. It essentially forces all Microsoft accounts on a PC to use Windows Hello, which should make login a little smoother. [Microsoft]
  • A former Tesla employee admits uploading source code to iCloud:  Guangzhi Cao, a former Tesla engineer, left the company to work for Chinese EV startup Xiaopeng Motors. He worked in Tesla’s Autopilot division, and before he left uploaded Autopilot source code to iCloud. Tesla has accused him of stealing the code to take to his new company, although Xiaopeng Motors denies any knowledge of the theft. Cao claims he deleted all the files he uploaded to the cloud. [The Verge]
  • Microsoft is closing Remix3D.com later this year: Microsoft is retiring Remix3D.com on January 10, 2020. The company introduced the site as part of a 3D push in its Windows 10 Creators Update. Much like TVs, 3D in Windows never took off, and now it seems to be winding down slowly. [Thurott]
  • Pale Moon browser’s older download versions infected with malware: Pale Moon, a fork of FireFox, announced that hackers breached its archive server. The server provided links to older versions of the browser, and the hackers added malware to those downloads. The goal seems to be stealing your cryptocurrency. Chalk it up to another reason not to use a Firefox fork. [ZDNet]
  • Google shut down the Nest Apple Watch app:  Do you use your Apple Watch to control your Nest thermostat? According to Google, probably not. The company says very few people used the app, and so it removed Apple Watch compatibility in the latest update. [9to5Google]
  • White Hat hackers tried to take down ransomware criminals, but it’s a draw: White Hat hackers tried to use a Denial of Service attack to prevent the spread of ransomware, in a novel approach to a growing problem. They noticed parts of how the ransomware spread and attacked were predictable and tried to take advantage of that vulnerability. Initially, it worked, but the bad hackers just updated the software. Nice try though. [Ars Technica]
  • Apple disabled Walkie-Talkie from the Apple Watch following exploit:  Following the disclosure of an exploit, Apple disabled the Walkie-Talkie feature on the Apple Watch. Details are scarce, but it seems with the right set of steps a bad actor could use Walkie-Talkie to listen to your conversations without you knowing. Apple promises to fix the problem and reenable the feature down the road. [9to5Mac]

RELATED: What Are Denial of Service and DDoS Attacks?

Forty years ago today, July 11th, NASA’s Skylab space station fell back to Earth.

Skylab was the first space station launched and operated by NASA. It only saw use for about 24 weeks, and the station was made up of a modified Saturn Rocket and leftover Apollo hardware.

The space station saw problems early and was damaged by the launch to get the rocket into space. As a result, astronauts spent a significant amount of time repairing the station when they first arrived.

Astronauts did perform experiments aboard the space station, ranging from life science to solar physics. But the main goal was just to prove that humans could live aboard a space station, even if only temporarily. In that way, Skylab paved the way to future space stations like the International Space Station (ISS).

After NASA decided to stop sending new crews to the station, its orbit slowly decayed before plummeting back to Earth. NASA attempted to control the fall so that the space station would land in the Indian Ocean and avoid harming anyone.

Unfortunately, parts of it did land in Australia, leading the country—and this is true—to fine NASA $400 for littering. [Space.com]

Want More? You can get the full Daily News Roundup by email every day in our newsletter. Just enter your email address and click the button.

Josh Hendrickson Josh Hendrickson
Josh Hendrickson has worked in IT for nearly a decade, including four years spent repairing and servicing computers for Microsoft. He’s also a smarthome enthusiast who built his own smart mirror with just a frame, some electronics, a Raspberry Pi, and open-source code.
Read Full Bio »