Serious flaws in six printer brands discovered, fixed
There are many ways to compromise company data, but IT teams often overlook one of the most serious: the humble printer. Continue reading Serious flaws in six printer brands discovered, fixed
Collaborate Disseminate
There are many ways to compromise company data, but IT teams often overlook one of the most serious: the humble printer. Continue reading Serious flaws in six printer brands discovered, fixed
A raft of bugs in six popular models can allow a hacker to wreak havoc on a corporate network. Continue reading DEF CON 2019: 35 Bugs in Office Printers Offer Hackers an Open Door
Receive any strange SMS text messages recently? If you live in the US, there’s a small chance you might have received an SMS with the following text in the last few days from someone called ‘j3ws3r on Twitter’: I’m here to warn the masses about SMS ema… Continue reading Hackers exploit SMS gateways to text millions of US numbers
Is there a way to manage certificates on a large group of printers that will install and renew them? It doesn’t look like any of the fleet management programs will do this. How are these managed in an enterprise environment?
… Continue reading Automating certificate management across a large number of printers?
If the scanner tray is considered as an interface, and it accepts input (basically it is its main functionality), could it be hacked using malicious code written on a piece of paper?
Continue reading Is it theoretically possible to hack printer using scanner tray?
Our office has a number of printers which, according to nmap are running Linux 2.6.X with a whole bunch of open ports 80
Continue reading Are Printers running Linux 2.6 something to be concerned about?
If I print the following noise texture image in which I’ve embedded some information with steganography, can I retrieve the information back or can I detect the information loss occurred due to degradation of quality in print… Continue reading Is it possible to retrieve embedded information in a printed image with steganography?
I just started my job as a penetration tester.
Me and my mentor got to the client’s office and our first order of business was to bypass the NAC system.
Searching for a printer or other similar devices was our first priority… Continue reading NAC bypass with MAC spoofing
I am very new to “networking” and security, but I realize that it would be more secure to have printers on their own “isolated network”.
How do I secure my networked printers?
What kind of printers do the most secure compan… Continue reading Secure architecture for isolated printer network
If wifi-enabled printers are a bad idea, I’m wondering what kind of printers (brand even perhaps) that secure companies use, such as banks or financial institutions. I would assume these printers don’t even have the capabilit… Continue reading What kind of printers do the most secure companies use?