Manage episode 492473793 series 2635675
Cybersecurity researchers have uncovered a serious flaw affecting nearly 700 Brother printer models that allows attackers to extract serial numbers and generate admin passwords without any authentication. Host Mikah Sargent walks through the step-by-step process of securing your Mac-connected printer using built-in macOS tools to access your printer's web interface and change those dangerous default passwords.
• Major Printer Security Vulnerability Discovered - Rapid7 cybersecurity company found flaws affecting Brother, Toshiba, and Fujifilm printers, with 689 Brother models impacted by the most serious vulnerability
• How the Attack Works - Bad actors can access printers without authentication, extract serial numbers, and use them to generate default admin passwords since manufacturers use predictable password generation methods
• Viewing Printer Details and Options - How to check printer queue, sharing settings, driver information, and supply levels through the macOS interface for connected Brother printers
• Opening Your Printer's Web Interface - Step-by-step guide to accessing the "Show Printer Web Page" option to reach your printer's built-in web server for advanced configuration
• Checking and Updating Firmware - Importance of keeping printer firmware current, though updates don't completely solve the manufacturing-level vulnerability that requires Brother to address
• Changing Default Admin Passwords - Critical security step of accessing the administrator login settings through the printer's web interface to replace factory default credentials
Host: Mikah Sargent
Download or subscribe to Hands-On Apple at https://twit.tv/shows/hands-on-apple
Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit
Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
36 episodes