
Sign up to save your podcasts
Or
Cybersecurity researchers have uncovered a serious flaw affecting nearly 700 Brother printer models that allows attackers to extract serial numbers and generate admin passwords without any authentication. Host Mikah Sargent walks through the step-by-step process of securing your Mac-connected printer using built-in macOS tools to access your printer's web interface and change those dangerous default passwords.
• Major Printer Security Vulnerability Discovered - Rapid7 cybersecurity company found flaws affecting Brother, Toshiba, and Fujifilm printers, with 689 Brother models impacted by the most serious vulnerability
• How the Attack Works - Bad actors can access printers without authentication, extract serial numbers, and use them to generate default admin passwords since manufacturers use predictable password generation methods
• Viewing Printer Details and Options - How to check printer queue, sharing settings, driver information, and supply levels through the macOS interface for connected Brother printers
• Opening Your Printer's Web Interface - Step-by-step guide to accessing the "Show Printer Web Page" option to reach your printer's built-in web server for advanced configuration
• Checking and Updating Firmware - Importance of keeping printer firmware current, though updates don't completely solve the manufacturing-level vulnerability that requires Brother to address
• Changing Default Admin Passwords - Critical security step of accessing the administrator login settings through the printer's web interface to replace factory default credentials
Host: Mikah Sargent
Download or subscribe to Hands-On Apple at https://twit.tv/shows/hands-on-apple
Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit
Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
4.3
344344 ratings
Cybersecurity researchers have uncovered a serious flaw affecting nearly 700 Brother printer models that allows attackers to extract serial numbers and generate admin passwords without any authentication. Host Mikah Sargent walks through the step-by-step process of securing your Mac-connected printer using built-in macOS tools to access your printer's web interface and change those dangerous default passwords.
• Major Printer Security Vulnerability Discovered - Rapid7 cybersecurity company found flaws affecting Brother, Toshiba, and Fujifilm printers, with 689 Brother models impacted by the most serious vulnerability
• How the Attack Works - Bad actors can access printers without authentication, extract serial numbers, and use them to generate default admin passwords since manufacturers use predictable password generation methods
• Viewing Printer Details and Options - How to check printer queue, sharing settings, driver information, and supply levels through the macOS interface for connected Brother printers
• Opening Your Printer's Web Interface - Step-by-step guide to accessing the "Show Printer Web Page" option to reach your printer's built-in web server for advanced configuration
• Checking and Updating Firmware - Importance of keeping printer firmware current, though updates don't completely solve the manufacturing-level vulnerability that requires Brother to address
• Changing Default Admin Passwords - Critical security step of accessing the administrator login settings through the printer's web interface to replace factory default credentials
Host: Mikah Sargent
Download or subscribe to Hands-On Apple at https://twit.tv/shows/hands-on-apple
Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit
Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
3,019 Listeners
1,968 Listeners
1,976 Listeners
201 Listeners
2,013 Listeners
870 Listeners
734 Listeners
79 Listeners
1,075 Listeners
543 Listeners
255 Listeners
331 Listeners
305 Listeners
718 Listeners
1,381 Listeners
964 Listeners
405 Listeners
4 Listeners
8 Listeners
3 Listeners
3 Listeners
6 Listeners