
HOA 189: macOS Printers & Scanners
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.
Add to Cart failed.
Por favor prueba de nuevo más tarde
Error al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tarde
Error al eliminar de la lista de deseos.
Por favor prueba de nuevo más tarde
Error al añadir a tu biblioteca
Por favor intenta de nuevo
Error al seguir el podcast
Intenta nuevamente
Error al dejar de seguir el podcast
Intenta nuevamente
-
Narrado por:
-
De:
Cybersecurity researchers have uncovered a serious flaw affecting nearly 700 Brother printer models that allows attackers to extract serial numbers and generate admin passwords without any authentication. Host Mikah Sargent walks through the step-by-step process of securing your Mac-connected printer using built-in macOS tools to access your printer's web interface and change those dangerous default passwords.
- Major Printer Security Vulnerability Discovered - Rapid7 cybersecurity company found flaws affecting Brother, Toshiba, and Fujifilm printers, with 689 Brother models impacted by the most serious vulnerability
- How the Attack Works - Bad actors can access printers without authentication, extract serial numbers, and use them to generate default admin passwords since manufacturers use predictable password generation methods
- Viewing Printer Details and Options - How to check printer queue, sharing settings, driver information, and supply levels through the macOS interface for connected Brother printers
- Opening Your Printer's Web Interface - Step-by-step guide to accessing the "Show Printer Web Page" option to reach your printer's built-in web server for advanced configuration
- Checking and Updating Firmware - Importance of keeping printer firmware current, though updates don't completely solve the manufacturing-level vulnerability that requires Brother to address
- Changing Default Admin Passwords - Critical security step of accessing the administrator login settings through the printer's web interface to replace factory default credentials
Host: Mikah Sargent
Download or subscribe to Hands-On Apple at https://twit.tv/shows/hands-on-apple
Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit
Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
Todavía no hay opiniones