Printer Hacking: No way? Yes way!

by | Jan 16, 2012 | Security

printerFDealing with printers in an office or business is usually a mundane and ordinary activity, but recent research suggests that these often-used devices can become doorways for hackers and online thieves to wreak all sorts of havoc in your IT systems – and even cause actual physical harm.

When it comes to printers, we usually think about ink, paper jams and minor irritations but certainly NOT getting hacked. But recent research suggests that printers can be used by hackers to infiltrate computer systems.

According to researchers at Columbia University, printers that are connected to the are the weakest (and almost always unnoticed) link that can compromise an otherwise secure system. Details are emerging, as the research was done under government and corporate grants. The Federal Bureau of Investigation got the first look at the research results, followed by people from Hewlett-Packard. What is clear is that this new research reveals that printers CAN be used by hackers or online thieves not only to infiltrate networks, but also to steal personal information and even identities.

The security flaw involves the printer software used to run “embedded systems” which enables both advanced functions and connects the printer directly the Internet. Alarmingly, researchers were able to hack into a printer, and give it instructions to continuously heat up the part of the device that dried the ink after it’s applied to the paper. The resulting heat caused the paper to turn brown and smoke.

The implications of this type of security flaw are concerning, but can be addressed properly and promptly with the right planning. HP is looking into the study for their own line of printers and business owners should also take precautionary steps to protect already installed devices on their networks.

If you want to know more about how you can ensure that your systems are secure, give us a call so we can sit down with you and discuss a security blueprint that meets your specific needs.

Published with permission from TechAdvisory.org. Source.

Related Posts

What is a Network Security Assessment?

What is a Network Security Assessment?

A network security assessment is a vital process that reveals the secrets of evaluating and strengthening your network defenses. In today's interconnected world, where cyber threats lurk around every corner, understanding the concept and purpose of a network security...

Preventing Phishing Attacks with Managed IT Services

Preventing Phishing Attacks with Managed IT Services

Phishing attacks have risen recently as many businesses store sensitive data online. Studies show that three billion phishing emails get sent daily. One of the best ways of preventing phishing attacks is by investing in managed IT services, and you’ll see how....

Cybersecurity Best Practices of 2022

Cybersecurity Best Practices of 2022

Cybersecurity threats are becoming increasingly popular as businesses digitalize their operations, calling for cybersecurity best practices. According to Identity Theft Resource Center’s data breach report, data breaches increased from 1,108 in 2020 to 1,603 data...

FIND OUT WHAT YOUR BUSINESS SHOULD EXPECT TO PAY
FOR HOUSTON TECH SUPPORT

Give us a call and discover how great local IT services and computer support can be!