

It favors ease of use over difficult-to-navigate security procedures. But for now, since many people have to use TeamViewer for one reason or another, we’ll show you how to do it in the most secure way possible.īy default, TeamViewer isn’t a particularly secure application.

If evidence comes to light that TeamViewer experienced a security breach, we’ll certainly update this information. And apart from a few users who had all the right settings, most victims were using an unsecured setup. Right now, we are inclined to reluctantly agree with TeamViewer’s press release: it’s very easy for a TeamViewer user to have their computer compromised if they don’t have all the right settings in order. As of this tutorial, we haven’t seen any evidence that indicates a system-wide security breach at TeamViewer, but something is certainly fishy. Recently, TeamViewer has been in the news because there has been a rash of computers compromised through the remote access tool.
