Webinar software is an attractive target for hackers – it’s widely used and trusted by businesses and individuals around the world, some of whom may not be as cyber aware as they could be. In many cases, the launching of a webinar app requires the download of a file onto the viewer’s device, which can act as the vehicle for malicious code. Until recently there were a few critical vulnerabilities in Cisco’s widely-used WebEx video conferencing software which were arguably a bit more pernicious. A vulnerable Windows machine could visit a modified and malicious page on the internet which would then use the webinar plug-in to make the machine do its bidding.
In order to rectify this, Cisco has taken steps to repair the holes in the Chrome and Firefox WebEx plugins that run on Microsoft Windows and which are integral to large numbers of its telecoms customers (who together make up a sizeable chunk of the business community).
Cisco has now issued patches for both browser extensions and, to be on the safe side, has also released an update for Microsoft browsers. In order to ensure their system is covered, Windows users should check the browser’s extensions menu for updates.