More stories

  • in

    This phishing attack is using a sneaky trick to steal your passwords, warns Microsoft

    Microsoft has warned Office 365 customers that they’re being targeted by a widespread phishing campaign aimed at nabbing usernames and passwords. The ongoing phishing campaign is using multiple links; clicking on them results in a series of redirections that lead victims to a Google reCAPTCHA page that leads to a bogus login page where Office 365 credentials are stolen.  

    ZDNet Recommends

    The best cyber insurance

    The cyber insurance industry is likely to go mainstream and is a simple cost of doing business. Here are a few options to consider.

    Read More

    This particular attack relies on the email sales and marketing tool called ‘open redirects’, which has been abused in the past to redirect a visitor to a trustworthy destination to a malicious site. Google doesn’t rate open redirects for Google URLs as a security vulnerability, but it does display a ‘redirect notice’ in the browser. SEE: Ransomware: This new free tool lets you test if your cybersecurity is strong enough to stop an attackMicrosoft warns this feature is being used by the phishing attackers. “However, attackers could abuse open redirects to link to a URL in a trusted domain and embed the eventual final malicious URL as a parameter. Such abuse may prevent users and security solutions from quickly recognizing possible malicious intent,” the Microsoft 365 Defender Threat Intelligence Team warns. This attack’s trick relies on the advice for users to hover over a link in an email to check the destination before clicking.

    “Once recipients hover their cursor over the link or button in the email, they are shown the full URL. However, since the actors set up open redirect links using a legitimate service, users see a legitimate domain name that is likely associated with a company they know and trust. We believe that attackers abuse this open and reputable platform to attempt evading detection while redirecting potential victims to phishing sites,” Microsoft warns. “Users trained to hover on links and inspect for malicious artifacts in emails may still see a domain they trust and thus click it,” it said. Microsoft has found over 350 unique phishing domains used in this campaign, including free email domains, compromised domains, and domains automatically created by the attacker’s domain generation algorithm. The email subject headers were tailored to the tool the attacker was impersonating, such as a calendar alert for a Zoom meeting, an Office 365 spam notification, or a notice about the widely used but ill-advised password expiry policy. While open redirects aren’t new, Microsoft hopped on the issue after noticing a phishing campaign in August that relied on spoofed Microsoft URLs. 

    ZDNet Recommends

    The Google reCaptcha verification adds to the apparent legitimacy of the site since it is generally used by websites to confirm the user is not a bot. However, in this case, the user has been redirected to a page that looks like a class Microsoft login page and eventually leads to a legitimate page from Sophos, which does provide a service to detect this style of phishing attack.  SEE: The Privacy Paradox: How can businesses use personal data while also protecting user privacy?”If the user enters their password, the page refreshes and displays an error message stating that the page timed out or the password was incorrect and that they must enter their password again. This is likely done to get the user to enter their password twice, allowing attackers to ensure they obtain the correct password.”Once the user enters their password a second time, the page directs to a legitimate Sophos website that claims the email message has been released. This adds another layer of false legitimacy to the phishing campaign.”Google’s word on the matter of open redirects is that this is not a security vulnerability, though it admits it can be used to trigger other vulnerabilities. However, Google disputes the idea that hovering over a link in an app to see a destination URL is a useful phishing awareness tip. “Open redirectors take you from a Google URL to another website chosen by whoever constructed the link. Some members of the security community argue that the redirectors aid phishing, because users may be inclined to trust the mouse hover tooltip on a link and then fail to examine the address bar once the navigation takes place.”Our take on this is that tooltips are not a reliable security indicator, and can be tampered with in many ways; so, we invest in technologies to detect and alert users about phishing and abuse, but we generally hold that a small number of properly monitored redirectors offers fairly clear benefits and poses very little practical risk.” More

  • in

    Singapore government expands bug hunt with hacker rewards scheme

    Singapore is offering payouts of up to $5,000 for white hackers to uncover security vulnerabilities in systems used by the public sector. The new scheme is the latest in the government’s efforts to involve the community in assessing its ICT infrastructure. The Government Technology Agency (GovTech) said its new Vulnerability Rewards Programme was the third crowdsourced initiative it has adopted to enhance the security of its ICT systems. It also runs bug bounty and vulnerability disclosure programmes, the latter of which is available to the public to report potential security holes. “The three crowdsourced vulnerability discovery programmes offer a blend of continuous reporting and seasonal in-depth testing capabilities that taps the larger community, in addition to routine penetration testing conducted by the government,” GovTech said in a statement Tuesday. 

    The government CIO office said the bug bounty programmes were “seasonal”, focusing on five to 10 critical and “high-profile” systems during each run. The new rewards scheme, though, would be ongoing and “continuously test” a wider range of critical ICT systems needed to deliver essential digital services, it said.Depending on the severity of vulnerabilities uncovered, between $250 and $5,000 would be offered to hackers that are approved to participate in the rewards programme. In addition, a special bounty of up to $150,000 could be awarded for vulnerabilities identified to potentially cause “exceptional impact” on selected systems and data. Details outlining such vulnerabilities would be provided to registered hackers and would apply only to selected government systems. According to GovTech, the special bounty would be measured against global crowdsourced vulnerability programmes, such as those run by technology vendors such as Google and Microsoft. 

    The new rewards scheme would initially encompass three public-sector systems, namely, SingPass and CorpPass; member e-services under the Manpower Ministry and Central Provident Fund Board; and WorkPass Integrated System 2, which is operated by the Manpower Ministry. The programme will also be extended to include more critical ICT systems progressively, GovTech said. Only hackers who meet a set of criteria will be permitted to participate in the rewards scheme, with checks to be conducted by bug bounty operator, HackerOne. Once approved, participants would have to conduct security assessments through a designated virtual private network gateway provided by HackerOne, and their access withdrawn if they breached the permitted rules of engagement. GovTech’s assistant chief executive for governance and cybersecurity, Lim Bee Kwan, said the government agency first adopted crowdsourced vulnerability discovery programmes in 2018. Since then, it had worked with more than 1,000 hackers to identified 500 valid vulnerabilities. “The new Vulnerability Rewards Programme will allow the government to further tap the global pool of cybersecurity talents to put our critical systems to the test, keeping citizens’ data secured to build a safe and secure smart nation,” Lim said. As of August 2021, the Singapore government had run four bug bounties–each lasting two to three weeks–covering 33 systems. More than $100,000 had been dished out to participants.  The public vulnerability disclosure programme was launched in October 2019 and has led to more than 900 reported vulnerabilities, as of March 2021, involving 59 government agencies. Of those, at least 400 were valid bugs that have since been plugged. A report last month revealed that half of vulnerabilities uncovered in 2020 via the Singapore government’s bug bounty and public disclosure programmes were valid. The public sector recorded a 44% increase in data incidents over the past year, though, none were assessed to be of “high severity”, according to the report by the Smart Nation and Digital Government Office. Some 1,560 SingPass accounts, needed to access e-government services, were involved in a 2014 security breach where users received notifications that their passwords had been reset, despite not requesting to do so. The government then blamed the incident on the likely use of weak passwords or malware that could have been installed on the affected users’ personal devices. Two-factor authentication (2FA) was introduced the following year as part of efforts to strengthen security on the e-government platform. RELATED COVERAGE More

  • in

    Chinese state media says online gaming for minors now limited to three hours per week

    Image: Getty Images
    People aged under 18 living in China will now only be allowed to play online games for three hours per week.The new mandate will see minors only be allowed to play one hour of online games on Fridays, Saturdays, Sundays, and on official holidays, according to state media outlet Xinhua. The one hour of online game time for these days will also only be allowed from 8pm to 9pm. The ban, issued by China’s National Press and Publication Administration (NAAP) on Monday evening, is aimed at preventing minors from becoming addicted to online gaming, the report said. In issuing the ban, the gaming regulator reportedly called for online game providers to implement real-name registration and logins, saying online game providers should not allow minors to play online games if they fail to register and log in using their real identifications. The NAAP also reportedly told Xinhua it would increase the frequency of its inspections on online gaming companies to ensure they implement time limit and anti-addiction systems. Prior to the latest measures, Tencent at the start of the month had already announced further restrictions for how much minors could play its flagship game Honour of Kings as part of efforts to appease government concerns. In that restriction, Honour of Kings gamers under the age of 18 had their playing time limited to one hour on regular days and two hours on public holidays.

    The expanded gaming ban is the latest among a flurry of moves China has made as part of its local crackdown on tech. In the area of online child protection alone, Beijing prosecutors have launched a civil public lawsuit against WeChat, accusing the company of not complying with laws focused on protecting minors, while the Cyberspace Administration of China passed a special action last month banning people under the age of 16 from appearing in content within online live-streaming and video platforms. Beyond online child protection, the Chinese government has pushed through new personal data protection laws, punished 43 apps for illegally transferring user data, and ordered local food delivery platforms to provide riders with minimum wages. It has also removed Didi from Chinese app stores and placed it under cybersecurity review, slapped Alibaba with a record 18.2 billion yuan fine, and put Tencent on notice for collecting more user data than deemed necessary when offering services.Related Coverage More

  • in

    Fujitsu says stolen data being sold on dark web 'related to customers'

    Data from Japanese tech giant Fujitsu is being sold on the dark web by a group called Marketo, but the company said the information “appears related to customers” and not their own systems.On August 26, Marketo wrote on its leak site that it had 4 GB of stolen data and was selling it. They provided samples of the data and claimed they had confidential customer information, company data, budget data, reports and other company documents including information on projects.Initially, the group’s leak site said it had 280 bids on the data but now, the leak site shows 70 bids for the data, including one bid today. A screenshot of the leak site.
    Etay Maor
    A Fujitsu spokesperson downplayed the incident and told ZDNet that there was no indication it was connected to a situation in May when hackers stole data from Japanese government entities through Fujitsu’s ProjectWEB platform.”We are aware that information has been uploaded to dark web auction site ‘Marketo’ that purports to have been obtained from our site. Details of the source of this information, including whether it comes from our systems or environment, are unknown,” a Fujitsu spokesperson told ZDNet.  “Because this includes information that appears related to customers, we will refrain from commenting on the details. I assume that you may recall the last event of Project WEB on May, but there is no indication that this includes information leaked from ProjectWEB, and we believe that this matter is unrelated.”Cybersecurity experts like Cato Networks senior director of security strategy Etay Maor questioned the number of bids on the data, noting that the Marketo group controls the website and could easily change the number as a way to put pressure on buyers.

    But Ivan Righi, cyber threat intelligence analyst with Digital Shadows, said Marketo is known to be a reputable source.Righi said the legitimacy of the data stolen cannot be confirmed but noted that previous data leakages by the group have been proven to be genuine. “Therefore, it is likely that the data exposed on their website is legitimate. At the time of writing, Marketo has only exposed a 24.5 MB ‘evidence package,’ which contained some data relating to another Japanese company called Toray Industries. The group also provided three screenshots of spreadsheets allegedly stolen in the attack,” Righi said. He explained that while Marketo is not a ransomware group, it operates similar to ransomware threat actors. “The group infiltrates companies, steals their data, and then threatens to expose that data if a ransom payment is not made. If a company does not respond to the threat actor’s ransom demand, they are eventually posted on the Marketo data leak site,” Righi told ZDNet. “Once a company is posted on the Marketo site, an evidence package is usually provided with some data stolen from the attack. The group will then continue to threaten the companies and expose data periodically, if the ransom is not paid. While the group does have an auction section on their website, not all victims are available in this section, and Fujitsu has not been put up for auction publicly at the time of writing. It is unknown where the 70 bids purportedly came from, but it is possible that these bids may originate from closed auctions.”Digital Shadows wrote a report about the group in July, noting that it was created in April 2021 and often markets its stolen data through a Twitter profile by the name of @Mannus Gott.The account has taunted Fujitsu in recent days, writing on Sunday, “Oh, the sweet, sweet irony. One of the largest IT services provider couldn’t find themselves an adequate protection.”The gang has repeatedly claimed it is not a ransomware group and instead an “informational marketplace.” They contacted multiple news outlets in May to tout their work. “The marketplace itself operates in a similar fashion to other data leak sites with some unique features. Interestingly the group includes an ‘Attacking’ section naming organizations that are in the progress of being attacked. The marketplace allows for user registration and provides a contact section for victim and press inquiries,” Digital Shadows Photon Research Team wrote.”Victims are provided a link to a separate chat to conduct negotiations. Within the individual posts, Marketo provides a summary of the organization, screenshots of seemingly compromised data, and a link to an “evidence pack” otherwise known as a proof. They auction sensitive data in the form of a silent auction through a blind bidding system where users make bids based on what they think the data is worth.” 
    Digital Shadows
    In the past, the group has gone so far as to send samples of stolen data to a company’s competitors, clients and partners as a way to shame victims into paying for their data back. The group has listed dozens of companies on their leak site, including Puma recently, and generally leaks one each week, mostly selling data from organizations in the US and Europe. At least seven industrial goods and services companies have been hit alongside organizations in the healthcare and technology sectors.  More

  • in

    Passport info and healthcare data leaked from Indonesia's COVID-19 test-and-trace app for travelers

    Researchers with vpnMentor have uncovered a data breach involving the COVID-19 test and trace app created by the Indonesian government for those traveling into the country. The ‘test and trace app’ — named electronic Health Alert Card or eHAC — was created in 2021 by the Indonesian Ministry of Health but the vpnMentor team, lead by Noam Rotem and Ran Locar, said it did not have the proper data privacy protocols and exposed the sensitive data of more than one million people through an open server. The app was built to hold the test results of those traveling into the country to make sure they were not carrying COVID-19 and is a mandatory requirement for anyone flying into Indonesia from another country. Both foreigners and Indonesian citizens must download the app, even those traveling domestically within the country. The eHAC app keeps track of a person’s health status, personal information, contact information, COVID-19 test results and other data.

    Rotem and Locar said their team discovered the exposed database “as part of a broader effort to reduce the number of data leaks from websites and apps around the world.” “Our team discovered eHAC’s records with zero obstacles, due to the lack of protocols in place by the app’s developers. Once they investigated the database and confirmed the records were authentic, we contacted the Indonesian Ministry of Health and presented our findings,” the vpnMentor research team said. “After a couple of days with no reply from the ministry, we contacted Indonesia’s Computer Emergency Response Team agency and, eventually, Google — eHAC’s hosting provider. By early August, we had not received a reply from any of the concerned parties. We tried to reach out to additional governmental agencies, one of them being the BSSN (Badan Siber dan Sandi Negara), which was established to carry out activities in the field of cyber security. We contacted them on August 22nd and they replied on the same day. Two days later, on August 24, the server was taken down.” 

    The Indonesian Ministry of Health and Foreign Ministry did not respond to requests for comment from ZDNet. In their report, the researchers explain that the people who created eHAC used an “unsecured Elasticsearch database to store over 1.4 million records from approximately 1.3 million eHAC users.”On top of the leak of sensitive user data, the researchers found that all of the infrastructure around eHAC was exposed, including private information about local Indonesian hospitals as well as government officials who used the app. The data involved in the leak includes user IDs — which ranged from passports to national Indonesian ID numbers — as well as COVID-19 test results and data, hospital IDs, addresses, phone numbers, URN ID number and URN hospital ID number. For Indonesians, their full names, numbers, dates of birth, citizenship, jobs and photos were included in the leaked data. 

    The researchers also found data from 226 hospitals and clinics across Indonesia as well as the name of the person responsible for testing each traveller, the doctors who ran the test, information about how many tests were done each day and data on what kinds of travelers were allowed at the hospital. The leaked database even had personal information for a traveler’s parents or next of kin as well as their hotel details and other information about when the eHAC account was created. Even eHAC staff members had their names, ID numbers, account names, email addresses and passwords leaked. “Had the data been discovered by malicious or criminal hackers, and allowed to accumulate data on more people, the effects could have been devastating on an individual and societal level,” the researchers said. “The massive amount of data collected and exposed for each individual using eHAC left them incredibly vulnerable to a wide range of attacks and scams. With access to a person’s passport information, date of birth, travel history, and more, hackers could target them in complex (and simple) schemes to steal their identity, track them down, scam them in person, and defraud them of thousands of dollars. Furthermore, if this data wasn’t sufficient, hackers could use it to target a victim in phishing campaigns over email, text, or phone calls.” 

    The vpnMentor research team uses “large-scale web scanners” as a way to search for unsecured data stores containing information that shouldn’t be exposed.”Our team was able to access this database because it was completely unsecured and unencrypted. eHAC was using an Elasticsearch database, which is ordinarily not designed for URL use,” the researchers added. “However, we were able to access it via browser and manipulate the URL search criteria into exposing schemata from a single index at any time. Whenever we find a data breach, we use expert techniques to verify the owner of the database, usually a commercial business.” The report notes that with all of the data, it would be easy for hackers to pose as health officials and conduct any number of scams on any of the 1.3 million people whose information was leaked. Hackers could have also changed data in the eHAC platform, potentially hampering the country’s COVID-19 response. The researchers noted that they were wary of testing any of these potential attacks out of fear of disrupting the country’s efforts to contain COVID-19, which may already be damaged by the government’s haphazard management of the database.The vpnMentor team added that if there was a hack or ransomware attack involving the database, it could have led to the kind of distrust, misinformation and conspiracy theories that have gained a foothold in dozens of countries. “If the Indonesian people learned the government had exposed over 1 million people to attack and fraud via an app built to combat the virus, they may be reluctant to engage in broader efforts to contain it — including vaccine drives,” the researchers said. “Bad actors would undoubtedly exploit the leak for their gain, jumping on any frustration, fear, or confusion, creating mistruths and exaggerating the leak’s impact beyond all reasonable proportion. All of these outcomes could significantly slow down Indonesia’s fight against Coronavirus (and misinformation in general) while forcing them to use considerable time and resources to fix their own mess. The result is further pain, suffering, and potential loss of life for the people of Indonesia.”The researchers said the designers of the eHAC system needed to secure the servers, implement proper access rules and made sure to never leave the system, which did not require authentication, open to the internet. They urged those who may think their information was affected to contact the Indonesian Ministry of Health directly to figure out what next steps may need to be taken. eHAC is far from the only COVID-19 related app to face similar problems. Since the beginning of the pandemic, the emergence of contact tracing apps has caused worry among researchers who have repeatedly shown how faulty these tools can be. Just last week, Microsoft faced significant backlash after their Power Apps were found to have exposed 38 million records online, including contact tracing records. In May, the personal health information belonging to tens of thousands of Pennsylvanians was exposed following a data breach at a Department of Health vendor. The Department of Health accused a vendor of exposing the data of 72,000 people by willfully disregarding security protocols.  More

  • in

    NBN forecasts slightly lower revenue and earnings for FY22

    An NBN FttN node getting a Nokia line card installed
    Image: Corinne Reichert/ZDNet
    Sticking to its mantra that publishing long term forecasts could hurt the company responsible for the National Broadband Network, the NBN Co Corporate Plan 2022 has restricted itself to stating finances for the current fiscal year. “NBN Co is targeting annual revenue and other income in FY22 of between AU$5 billion to AU$5.2 billion and EBITDA in the range of AU$3 billion to AU$3.2 billion,” the company said in a rare mention of fiscal information. Unlike in years past, it did not state net profit nor capital expenditure for the coming year. Compared to the last year’s set of figures that did, the company said it was previously expecting revenue to be AU$5.3 billion, earnings before interest, tax, depreciation, and amortisation (EBITDA) to be AU$3.3 billion, and to post a net loss of AU$2.2 billion. Capital expenditure for FY22 was previously flagged as AU$3.8 billion. On topics it would talk about, NBN said it was on track to get 75% of its footprint, around 8 million premises, capable of handling 1Gbps ultrafast speeds by 2023. Last year: Backflip to the home: NBN to upgrade FttN areas with fibre “From a total fixed-line network perspective, and in less than a year, the proportion of customers now able to access our ultrafast plans has doubled to 40% and is climbing higher every month,” CEO Stephen Rue and chair Ziggy Switkowski wrote. “We have also made considerable progress in our hybrid fibre coaxial (HFC) network enhancement program. This program has seen the proportion of HFC customers able to access NBN Co’s higher [1Gbps] wholesale speed plan …. increase from 7% in May 2020, to 90% today.”

    The company added that all 2.5 million HFC premises could access download speeds of up to 250Mbps. To hit its 75% target, NBN said its entire single-dwelling premises within the fibre to the curb (FttC) footprint would be able to be upgraded to full fibre connections when customers wanted speeds over 250Mbps. The first customers will be able to do so in 2022. The company added it has 11,000 complex installations remaining in its footprint. Rue and Switkowski added the network was tested and “passed with flying colours” in the previous year. Farewell, sweet forecasting table.
    Image: NBN
    NBN details 300,000 further FttN upgrade areas Building from its previous announcements, NBN said on Tuesday it had added 300,000 premises to its fibre to the node (FttN) upgrade plans, taking the total to 1.4 million premises. NBN is planning to make FttN on-demand upgrades available to 2 million premises when an order is placed for a service over 100Mbps. NBN is set to conduct a “small-scale launch” in November to allow the first customers to place orders with retailers for upgrades. The new areas to get upgrades are listed below, broken down by state. New South Wales Albion Park Rail, Alstonville, Ambarvale, Avalon Beach, Banora Point, Beaumont Hills, Berkeley, Brighton-Le-Sands, Broulee, Bundeena, Callala Bay, Callala Beach, Campbelltown, Currans Hill, Dalmeny, Farmborough Heights, Figtree, Glen Alpine, Glenmore Park, Glenwood, Goonellabah, Goulburn, Harrington Park, Kellyville, Kellyville Ridge, Keiraville, Lake Heights, Lennox Heads, Mollymook Beach, Mount Warrigal, North Nowra, Palm Beach, Pottsville, Rouse Hill, Ruse, Stanhope Gardens, Sussex Inlet, Sutherland, The Ponds, Tweed Heads, Tweed Heads South, Unanderra, Warrawong, Windang, Yamba. Victoria Beaconsfield, Berwick, Craigieburn, Echuca, Kialla, Mornington, Narre Warren South, Lakes Entrance, Myrtleford, Newport, Packenham, Port Fairy, Sunbury, Tarneit, Traralgon, Wangaratta, Warrnambool, Williamstown, Williamstown North, Woori Yallock. Queensland Battery Hill, Bellbowrie, Bli Bli, Brassall, Brinsmead, Coomera, Darling Heights, Edmonton, Condon, Harristown, Maroochydore, Moggill, Newtown, Oakey, Palm Cove, Redland Bay, Sippy Downs, Smithfield, Springfield Lakes, Toowoomba City, Upper Coomera, Yorkeys Knob. South Australia Clovelly Park, Craigmore, Findon, Mitchell Park, Morphett Vale, Rosewater, Woodville South. Western Australia Armadale, Atwell, Bassendean, Bayswater, Beaconsfield, Cannington, Claremont, Forrestfield, Fremantle, Innaloo, Morley, Myaree, Piarra Waters, Port Kennedy, Rockingham, Safety Bay, Seville Grove, Shoalwater, Stirling, Waikiki, Wattle Grove, White Gum Valley, Willagee, Wilson. Related Coverage More

  • in

    BlueJeans vs. Zoom: Video conferencing apps compared

    Shutterstock
    In such a short time, coronavirus has changed the way that we work and communicate, but thanks to video conferencing apps, it is now possible to do business from anywhere in the world. These apps have become an integral part of business, proving that they are here to stay, especially given the rise of the remote worker and teleworking.The right video conferencing app can provide everything you need for successful meetings and events in a world increasingly gone digital. But which is better when it comes to Zoom versus BlueJeans? We take a deep dive.

    Multi-faceted tele-networking with intelligent workplace solutions

    Shutterstock

    Specs HD videoDolby Voice audioUnlimited recordingsTranscriptions in real-timeMeeting highlightsCustom performance analyticsAdvanced security featuresUnlimited 1:1 meetingsUnlimited group meetingsMeet for as long as neededFeaturesBlueJeans is trusted with the business of big companies like Adobe, Facebook, and Virgin.  There are several ways to meet using BlueJeans software, with multiple room systems all easily categorized for your use: BlueJeans Meetings: Enjoy secure virtual meetings.BlueJeans Events: Gain access to interactive live streaming for webinars and virtual events.BlueJeans Rooms: Use Rooms for private, intelligent workspaces.BlueJeans Gateway: Use Microsoft Teams rooms via Cloud Video Interop.BlueJeans Telehealth: Enjoy virtual healthcare with BlueJeans Telehealth.BlueJeans features one-touch access to several types of meeting platforms and is compatible with multiple devices and browsers for easy compatibility. There are upgraded security measures boasting enhanced HD video with Dolby Voice audio. An added benefit is that guests do not need an account to join your meeting, so you can still meet with whomever you like without the requirement of a paid subscription.  

    How much does BlueJeans cost?

    Plans and pricingThere are several plan options to use the BlueJeans platform. All plans come with unlimited 1:1 meetings and group meetings with the ability to meet for as long as needed.PlanPricePrimary featuresVirtual MeetingsBlueJeans Standard$12.49 host/mo$119.88 host/yrUp to 100 participantsFive hours of meeting recording per hostBlueJeans Pro$17.49 host/mo$167.88 host/yrUp to 150 participants25 hours of meeting recording per hostCommand Center AnalyticsSlack and Microsoft Teams workstream integrationsOkta and Splunk security integrationsBlueJeans Enterprise$19.99 host/mo$199.92 host/yrUp to 200 participantsUnlimited meeting recording per hostAutomated closed captioningReal-time transcriptionBrand customizationBlueJeans Enterprise PlusContact for quoteCustom licensing, access, and supportWebinars/EventsBlueJeans Video Webinars/Events – 100 attendees$99/mo$996/yrUnlimited non-concurrent webinarsMaximum two-hour webinarsAttendee workflow and reportingAttendee engagement featuresFacebook Live streamingAutomated closed captioningBlueJeans Video Webinars/Events – 200 attendees$379/mo$3,756/yrUnlimited non-concurrent webinarsMaximum two-hour webinarsAttendee workflow and reportingAttendee engagement featuresFacebook Live streamingAutomated closed captioningBlueJeans Video Webinars/Events – 500 attendees$599/mo$5,988/yrUnlimited non-concurrent webinarsMaximum two-hour webinarsAttendee workflow and reportingAttendee engagement featuresFacebook Live streamingAutomated closed captioningLarge-Scale Video EventsContact for quoteUp to 50,000 view-only attendeesFlexible event lengthBlueJeans Accelerator for network performanceRestricted EventsAdvanced supportGateway for Microsoft TeamsPer Room Plan$113.85 room/mo$1,188 room/yrCloud video interopUp to 19 roomsLarge Scale Deployment PlanContact for quoteCompatible with all SIP/H.323 endpointsFour-step deployment processOne-touch meeting joinReal-Time call analyticsDeployment support

    What are the pros and cons to BlueJeans?

    ProsBlueJeans brings the power of Verizon to its virtual meeting tools, offering an extra layer of security and reliability for your peace of mind. It is a simple matter to get set up, and users also rave about the excellent audio quality on each call. BlueJeans also offers the power to host more than 10,000 guests with its event and webinar plans.ConsBlueJeans does have some setbacks. Users have reported issues with software updates, leading to complications and delays when it comes time to meet. There are also reports that the software can become glitchy when connecting via external platforms, so users recommend using the BlueJeans app for best functionality. BlueJeans does not offer a free plan, so you will need to subscribe for use after the free 14-day trial concludes.

    Flexible, HIPAA-compliant telenetworking solutions for large corporations

    Shutterstock

    SpecsHIPAA-compliant telehealth Zoom Apps for easy integrationMeetings for 10,000+ participantsZoom home phone serviceUnlimited group meetingsUnlimited one-on-one meetings Lobby chat optionCloud recordingsMonetizationLive streamingFeaturesJoin existing Zoom customers such as Capital One, Western Union, DocuSign, and Nasdaq. Zoom gives you several options for your telenetworking, including:Zoom Meetings: Host up to 500 guests with unlimited group and one-on-one meetings.Zoom Rooms: Keep your meetings secure with Zoom Rooms. Zoom Events and Webinars: Enjoy full-scale event and webinar management for over 10,000 guests.Zoom App Marketplace: Zoom Apps integrate right into your video, including Slack, Zoom for HubSpot, and Google Workspace integrations.Zoom for Home: There is also phone service and integration with smart homes via Zoom for Home.Zoom United: Bundle chat, phone, and meetings for up to 500 guests.Host anywhere from 100 guests for free to more than 10,000 guests with special licensing. Zoom’s free plan is generous with hosting for 100 guests, unlimited meetings of 40 minutes or less, and one-on-one meetings with a 30-hour time limit. There is also available chat for participants with the ability to stream via your favorite social media platforms and cloud storage. Users also have the ability to host multi-session events with full attendee reporting and engagement reports for additional insight.

    How much does Zoom cost?

    Plans and pricingPlanPricePrimary featuresZoom MeetingsBasic$0Host up to 100 guestsUnlimited group meetings up to 40 minutesUnlimited one-on-one meetings with 30-hour limitPrivate and group chatPro$14.99/month per license$149.90/year per licenseHost up to 100 guestsUnlimited group and one-on-one meetings with 30-hour limitSocial media streaming1 GB cloud recording per licenseBusiness$19.99/month per license$199.90/year per licenseHost up to 300 guestsSingle sign-onRecording transcriptsManaged domainsCompany branding Large Enterprise-Ready$19.99/month per license$240/year per licenseHost up to 500 participantsUnlimited cloud storageRecording transcriptsZoom Events & Zoom WebinarsZoom Webinar 500$79/month per licenseUp to 500 guestsUnlimited webinars for up to 30 hours eachExportable registration and attendee listsLive streamingMonetizationCloud recordingsEngagement reportsZoom Events 500$99/month per licenseWebinar package plus:Event management toolsEvent hub to organize and showcase eventMulti-session eventsCustom registration and ticketingAttendee networking lobby with chatPost-event recording managementDetailed event reportingZoom Webinar 1,000$340/month per license$3,400/year per licenseWebinar package plus:Up to 1,000 guestsZoom Events 1,000$440/month per license$4,400/year per licenseEvents package plus:Up to 1,000 guestsZoom Webinar 3,000$990/month per license$9,900/year per licenseWebinar package plus:Up to 3,000 guestsZoom Events 3,000$1290/month per license$12,900/year per licenseEvents package plus:Up to 3,000 guestsZoom Webinar 5,000$2,490/month per license$24,900/year per licenseWebinar package plus:Up to 5,000 guestsZoom Events 5,000$3,240/month per license$32,400/year per licenseEvents package plus:Up to 5,000 guestsZoom Webinar 10,000$6,490/month per license$64.900/year per licenseWebinar package plus:Up to 10,000 guestsZoom Events 10,000Contact for pricingEvents package plus:Up to 10,000 guestsZoom Webinar 10,000+Contact for pricingWebinar package plus:Up to 10,000+ guestsZoom Events 10,000+Contact for pricingEvents package plus:Up to 10,000+ guestsZoom RoomsZoom Rooms$49/month per room$499/year per room(free 30-day trial)Up to 49 Zoom Rooms licensesZoom UnitedPro$25/month per user$250/yearChat and Phone, plus:Meetings up to 100 participants1 GB cloud storage recording per licenseSocial media streamingBusiness$30/month per user$300/yearChat and Phone, plus:Meetings up to 300 participantsSingle sign-onRecording transcriptsManaged domainsCompany brandingEnterprise$30/month per user$360/yearChat and Phone, plus:Meetings up to 500 participants

    What are the pros and cons to BlueJeans?

    ProsZoom makes it easy to use its software, offering a free plan for customers. Guests are not required to make an account, so you can get started that much sooner. There are unlimited meetings, so you do not have to track usage, and if you upgrade to a paid plan, you can host webinars for more than 10,000 guests.ConsZoom’s free plan does carry limitations, like limiting the time for each meeting to 40 minutes. It also limits how many guests you can invite, even when you subscribe to a paid plan. Zoom has several options for plans, with pricing ranging from the free plan to custom quotes that cost several thousand dollars per month for your larger corporations. For smaller groups, the amount you pay depends on the features you choose, but can still add up quickly.

    How do BlueJeans and Zoom compare?

    Although similar, there are some key differences between BlueJeans and Zoom that can help you determine which may be a better fit for you.Software requirementsBlueJeans offers its own app for download, as well as a desktop software that works with Windows, Mac, and Linux systems. Zoom also has an app and is compatible with Windows, Mac, and Linux systems, plus several other systems, like Mint, CentOS, and Fedora operating systems.Meeting typesBoth Zoom and BlueJeans have meeting and event features with the option for private rooms. From there, the services each offer their own custom features. While BlueJeans offers virtual telehealth and a Gateway feature for Microsoft Teams, Zoom takes a different focus with webinars and a loaded app marketplace. Zoom also integrates with your smart home to create an all-in-one home bundle of phone, chat, and meetings for up to 500 attendees.UsageThere is an enormous difference when comparing the usage available between BlueJeans and Zoom. Zoom accommodates meetings with up to 500 guests, but if you sign up for BlueJeans, you can host webinars and events for more than 10,000 guests. If you anticipate that you will hold large meetings in the future, BlueJeans gives you the room to grow, something that Zoom lacks.PriceBlueJeans Virtual Meetings begin at $12.49 per month for its Standard plan, but pricing quickly becomes more expensive as you begin adding extra features. There is no free plan, but there is a free 14-day trial, so you can take the features for a test drive before you have to commit with your credit card. Zoom does not offer a free trial, but there is a free plan if you need basic meeting capability. 

    Which video conferencing app is right for you?

    If…Then…You have short, occasional meetings,Zoom is right for youYou manage large teams,BlueJeans Gateway can help.You need virtual health care,BlueJeans TeleHealth is for you.You have a smart home,Zoom for Home can integrate with your home.You have a lot of meetings and want to save money,Consider bundling services with Zoom United.

    Are there alternative video conferencing apps worth considering?

    Zoom and BlueJeans are far from the only telenetworking solutions. Other alternatives for your video conferencing include companies such as these:Google Meet: Also known as Google Hangouts Meet, Google Meet allows users to interact within the Google Workspace. GoToMeeting: As one of the original meeting apps, GoToMeeting has a high limit for your meeting team, but you will have to upgrade when you want to meet with more than 150 attendees.Microsoft Teams: A subscription is necessary to access advanced features, but Microsoft Teams offers a convenient way to communicate and work within the Microsoft platform.Cisco Webex: The free plan gives access to up to 100 guests for a maximum of 50 minutes per meeting. 

    Is Zoom or BlueJeans free to use?

    You can use Zoom for free, but BlueJeans requires users to purchase a plan after the 14-day trial. 

    Which video conferencing app is best for business?

    BlueJeans offers expanded meeting capability with extra features like virtual telehealth and large webinar capacity to best meet the needs of a growing business.

    Which video conferencing app is best for personal use?

    Zoom is a video conferencing software that is best for personal use with an affordable free plan, expanded meeting tools, and smart home integration to make life at home a breeze.

    ZDNet Recommends More

  • in

    Hybrid work here to stay: What does that mean for security?

    When organizations moved abruptly to remote work at the start of the pandemic, they had to quickly shift their network and security capabilities. That meant some shortcuts were taken and some priorities were left on the table. 

    Not surprisingly, that abrupt turnaround had some negative consequences for organizations. A new survey commissioned by Palo Alto Networks examines the impacts of those decisions, as well as the steps organizations are taking now, as they plan for more permanent hybrid work strategies. As many as 61% of respondents said struggled to provide the necessary remote security to support work-from-home capabilities, according to the survey. Security certainly wasn’t the only problem. Yet by mid-2021, most organizations felt comfortable with their network and addressed earlier user complaints about collaboration tool performance and efficacy. Security continues to top the list of significant ongoing challenges for 51% of respondents. That said, one-fourth to one-third of respondents are still struggling to provide a positive, well-rounded user experience. The newly-released survey, conducted for Palo Alto Networks by ONR, polled 3,000 people, including technology executives, as well as members of networking, security and operations teams. At the time of the survey, more than two-thirds of organizations indicated that between 25% to 75% of their workforce is still working remotely. Meanwhile, 44% expect to have over half of their employees working remotely in 12 months’ time. As many as 62% of survey respondents are in the process of optimizing their hybrid workforce, with 94% considering some sort of hybrid workforce over the next 12 months.Earlier in the pandemic, IT teams took different approaches to the remote-work pivot: Most (44%) respondents said their organizations made investments to improve remote network access but invested relatively little in remote security. 

    Another 35% said their organizations invested robustly in both network access capabilities and security. Another 21% said their organizations made very few changes in both their existing network architecture or security. Among those with minimal upgrades to their network, 48% now believe that their network cannot support current remote work demands or that their remote network is not sustainable. By contrast, this sentiment is expressed by only 21% of those who evolved their network and 14% of those who evolved both their network and their remote security.
    Palo Alto Networks
    Meanwhile, 53% of organizations that prioritized remote access over security are now exposed to a significant increase in security risks from unchecked acceptable use policy violations and unsanctioned application usage. Those who made minimal changes to their remote access saw a 23% increase in security issues. Use policy violations should have been predictable. “As has been the case in the past, when security measures become a burden – slowing down systems or otherwise impeding productivity and impairing the user experience – employees will often find creative ways to evade them,” the report says. “Remote work and the rise of cloud-based applications has made that easier than ever before. The expansion of remote work has opened the door to both an increased burden of security and an increased opportunity to evade controls.”The report suggest that supplying employees with effective collaboration and productivity tools would give workers less incentive to find security workarounds. Organizations that lack effective remote collaboration tools said that their users are over 8x more likely to report high levels of security evasion. Additionally, the survey shows that 60% of organizations expanded BYOD to enable their employees to work from home. However, as a result, organizations that allow increased BYOD usage have employees who are over 8x more likely to ignore, circumvent, or disable security than those who restricted BYOD. Now, as organizations look more at the long-term picture, 74% say a single end-to-end remote security solution would improve their posture. Additionally, 71% of organizations expect to have their security mostly or completely in the cloud over the next 24 months. More