Yesterday, TeamViewer, an organization commonly known for their remote access product, released a press statement surrounding reports of a service outage and user machines being accessed maliciously via the TeamViewer application. As new information is released, we will update accordingly.
Statement from TeamViewer
“TeamViewer experienced a service outage on Wednesday, June 1, 2016. The outage was caused by a denial-of-service attack (DoS) aimed at the TeamViewer DNS-Server infrastructure. TeamViewer immediately responded to fix the issue to bring all services back up.Some online media outlets falsely linked the incident with past claims by users that their accounts have been hacked and theories about would-be security breaches at TeamViewer. We have no evidence that these issues are related.
The truth of the matter is:
- TeamViewer experienced network issues because of the DoS-attack to DNS servers and fixed them.
- There is no security breach at TeamViewer.
- Regardless of the incident, TeamViewer continuously works to ensure the highest possible level of data and user protection.
TeamViewer strongly recommends:
- Users should protect any user account – whether it is with TeamViewer or any another supplier – by using unique and secure passwords that are frequently changed.
- Users should ensure they have reliable anti-malware and security solutions in place at all times.”
Source: http://www.teamviewer.com/en/
Desktop Remote Access Policy
As per the Desktop Remote Access Policy, LogMeIn is the vetted and approved remote access application. Further information surrounding the policy can be found below:
http://www.fordham.edu/