
Sign up to save your podcasts
Or
Cybersecurity researchers have uncovered a serious flaw affecting nearly 700 Brother printer models that allows attackers to extract serial numbers and generate admin passwords without any authentication. Host Mikah Sargent walks through the step-by-step process of securing your Mac-connected printer using built-in macOS tools to access your printer's web interface and change those dangerous default passwords.
• Major Printer Security Vulnerability Discovered - Rapid7 cybersecurity company found flaws affecting Brother, Toshiba, and Fujifilm printers, with 689 Brother models impacted by the most serious vulnerability
• How the Attack Works - Bad actors can access printers without authentication, extract serial numbers, and use them to generate default admin passwords since manufacturers use predictable password generation methods
• Viewing Printer Details and Options - How to check printer queue, sharing settings, driver information, and supply levels through the macOS interface for connected Brother printers
• Opening Your Printer's Web Interface - Step-by-step guide to accessing the "Show Printer Web Page" option to reach your printer's built-in web server for advanced configuration
• Checking and Updating Firmware - Importance of keeping printer firmware current, though updates don't completely solve the manufacturing-level vulnerability that requires Brother to address
• Changing Default Admin Passwords - Critical security step of accessing the administrator login settings through the printer's web interface to replace factory default credentials
Host: Mikah Sargent
Download or subscribe to Hands-On Apple at https://twit.tv/shows/hands-on-apple
Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit
Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
3.7
33 ratings
Cybersecurity researchers have uncovered a serious flaw affecting nearly 700 Brother printer models that allows attackers to extract serial numbers and generate admin passwords without any authentication. Host Mikah Sargent walks through the step-by-step process of securing your Mac-connected printer using built-in macOS tools to access your printer's web interface and change those dangerous default passwords.
• Major Printer Security Vulnerability Discovered - Rapid7 cybersecurity company found flaws affecting Brother, Toshiba, and Fujifilm printers, with 689 Brother models impacted by the most serious vulnerability
• How the Attack Works - Bad actors can access printers without authentication, extract serial numbers, and use them to generate default admin passwords since manufacturers use predictable password generation methods
• Viewing Printer Details and Options - How to check printer queue, sharing settings, driver information, and supply levels through the macOS interface for connected Brother printers
• Opening Your Printer's Web Interface - Step-by-step guide to accessing the "Show Printer Web Page" option to reach your printer's built-in web server for advanced configuration
• Checking and Updating Firmware - Importance of keeping printer firmware current, though updates don't completely solve the manufacturing-level vulnerability that requires Brother to address
• Changing Default Admin Passwords - Critical security step of accessing the administrator login settings through the printer's web interface to replace factory default credentials
Host: Mikah Sargent
Download or subscribe to Hands-On Apple at https://twit.tv/shows/hands-on-apple
Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit
Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
3,019 Listeners
1,970 Listeners
201 Listeners
1,344 Listeners
2,013 Listeners
5,408 Listeners
349 Listeners
79 Listeners
1,075 Listeners
1,169 Listeners
305 Listeners
1,385 Listeners
405 Listeners
111,864 Listeners
497 Listeners
941 Listeners
4 Listeners
5,926 Listeners
8 Listeners
3 Listeners
6 Listeners