Abstract
We conducted the first data-driven study of calls for zoombombing attacks. We analyzed 223 calls for zoombombing posted on Twitter and 4chan. We found that most calls for zoombombing come from insiders who have legitimate access to the meetings, calling into question widely adopted mitigation techniques to secure online meetings.
| Original language | English |
|---|---|
| Pages (from-to) | 22-30 |
| Number of pages | 9 |
| Journal | IEEE Security and Privacy |
| Volume | 20 |
| Issue number | 2 |
| DOIs | |
| State | Published - 2022 |
Fingerprint
Dive into the research topics of 'A First Look at Zoombombing'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver