Networked Scanners Offer A Window Into The Enterprise, Researcher Says

    Date02 Sep 2010
    CategoryHacks/Cracks
    2495
    Posted ByAnthony Pell
    It happens every day -- a sensitive document lies in the copier room, forgotten by the person who left it on the scanner. No big deal, right? Nobody else was able to read it. Wrong, says Michael Sutton, a lab researcher at security vendor Zscaler. In fact, that document could easily be captured by an insider or an external hacker, without ever moving the paper from the scanner.

    In a blog posted yesterday, Sutton offered some hard evidence to suggest that networked scanners equipped with remote operations capabilities can easily be tapped to collect data from the sensitive documents that are run through them each day.

    You are not authorised to post comments.

    LinuxSecurity Poll

    Has your email account ever been pwned in a data breach?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    12
    radio
    [{"id":"53","title":"Yes","votes":"8","type":"x","order":"1","pct":88.89,"resources":[]},{"id":"54","title":"No","votes":"1","type":"x","order":"2","pct":11.11,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.