• Contact Us
  • Advertise
  • Submit PR
Monday, January 26, 2026
  • Login
  • Register
YNOT
  • Home
  • Industry News
    • Porn Star & Adult Talent News
    • Adult Business News
    • Adult Novelty News
    • Adult Industry Legal News
    • Tech News for Adult Webmasters
    • Video Game News for Adults
    • EU News
  • PR Wire
  • Podcasts
  • Industry Guides
  • Newsletters
No Result
View All Result
  • Home
  • Industry News
    • Porn Star & Adult Talent News
    • Adult Business News
    • Adult Novelty News
    • Adult Industry Legal News
    • Tech News for Adult Webmasters
    • Video Game News for Adults
    • EU News
  • PR Wire
  • Podcasts
  • Industry Guides
  • Newsletters
No Result
View All Result
YNOT
No Result
View All Result
Home Adult Industry News from YNOT Adult Business News

Networked Printers – An Often Overlooked Security Vulnerability

admin by admin
January 19, 2007
in Adult Business News
News Flash to White House: 95-Percent of Americans Didn’t Wait for Marriage
491
SHARES
Share on FacebookShare on Twitter

CYBERSPACE – In an article published this week, ComputerWorld.com recounts the cautionary tale of McCormick and Co., and the giant spice company’s recurring problem with worms – not the wiggling, animal variety, but the costly, invasive, digital kind.When Blaster originally took hold at McCormick, the worm spread rapidly through the company’s network, infecting computers in offices and production facilities alike. What baffled the company’s IT employees, though, was the fact that Blaster kept recurring even after an extensive network-wide anti-viral scrub.

The reason for the recurring problem, it turns out, is that Blaster, along with the Sasser worm, was re-propagating from infected networked printers, according to what company officials told ComputerWorld.com.

“Printers were just one of several types of systems contributing to the nightmare at the time,” Michael Rossman, who had recently become global director of IT services and information security for McCormick at the time of the Blaster worm’s outbreak in 2003. “Blaster went to all our PCs, our radio frequency units, our handhelds. And, we learned belatedly, it also spread to our printers.”

According to ComputerWorld.com, there has been little evidence of printer-based exploits spreading across company networks and the issue has accordingly slipped on to the back-burner for most IT professionals.

Some security experts are now warning that companies ignore their printer-driven vulnerability at their own peril, noting that many printers are laden with a wide variety of applications and run an assortment of vulnerable services with next to no oversight from corporate IT staffs.

“It’s been my experience that these devices have been completely overlooked from a risk management perspective,” security researcher Brendan O’Connor told ComputerWorld.com. “They’re installed. They work. And nobody pays them any attention until it’s time to install a new paper tray or print cartridge.”

In a presentation at the Black Hat conference in Las Vegas last summer, O’Connor gave a presentation on how to get around authentication, execute commands at the root level, and create shell code to compromise printers from the Xerox WorkCentre line of printers, which use Linux operating systems.

“There are actually a quite a few attack vectors in these printers,” O’Connor told ComputerWorld.com. “I shared a couple in my talk and I released a couple others privately to Xerox.”

Xerox reportedly thanked O’Connor for his research and issued a patch, although O’Connor says some vulnerabilities still exist in the WorkCentre line.

One reason for the generally lax security standards for networked printers is the relative paucity of attacks targeting printers, a fact that Dean Turner, a senior manager for security response at Symantec Corp attributes to it being easier for hackers to target PCs and laptops.

Turner cautioned that as laptops and PCs are made more secure through more rigorous security standards, hackers will turn their attention to devices that get less attention from IT departments, like printers.

Another problem cited by security professionals is a commonly held misconception that printers are only open to exploit via attacks that originate from a company’s local area network or through a remote login to a virtual private network. Not so, Alan Paller, research director at the SANS Institute told ComputerWorld.com.

“Five years ago, four HP Jetdirect printer controllers were used in a denial-of-service attack that took down an ISP in New Mexico,” Paller said. “And more recently, shared printers have become back doors that allow attackers to bridge from low-security areas to high-security areas.”

As McCormick and Co. found out, allowing lax security protocols for a networked printer can be a costly error.

“Network printers are large print devices with embedded Windows systems that are interacting with the network just like any other Windows-based system,” McCormick’s IT director Rossman said. “They need to be secured.”

Share196Tweet123
admin

admin

YNOT Admin wields his absolute power without mercy. When he's not busy banning spam comments to hell he enjoys petting bunnies and eating peanut butter. He recommends everyone try the YNOT Mail (ynotmail.com) email marketing platform and avoid giving their money to mainstream services that hate adult companies.

Related Posts

Adult Business News

TikTok Faces Claims of Blocking Epstein References in Direct Messages

January 26, 2026
Adult Business News

New Study Finds Why People Use Pornography Matters More Than How Often

January 26, 2026
Arizona Bill Would Ban Sale, Production of Porn in the State
Adult Business News

Arizona Bill Would Ban Sale, Production of Porn in the State

January 26, 2026
Adult Business News

ManyVids Shifts from Adult Promotion to Bizarre AI Posts About Chakras and Aliens

January 24, 2026
Load More

SPONSOR

INDUSTRY EVENTS

Currently Playing

YNOT Summit Model Track: Nerds Dig Sexy Gamers

YNOT Summit Model Track: Nerds Dig Sexy Gamers

01:05:46

YNOT Summit Webmaster Track: Understanding Webcam Business Models

00:51:11

YNOT Summit Model Track: Cam Law 101

01:26:24

SPONSOR

POPULAR NEWS

TikTok Faces Claims of Blocking Epstein References in Direct Messages

January 26, 2026

Why Thousands of AI Bots Could Be a Cybersecurity Disaster Waiting to Happen

January 26, 2026

New Study Finds Why People Use Pornography Matters More Than How Often

January 26, 2026

Sponsor

YNOT YNOT

QUICK LINKS:

  • About YNOT
  • Terms of Use
  • Privacy Policy
  • Editorial Team
  • Advertise on YNOT
  • Support
  • Contact Us
  • Sitemap

FRIENDS OF YNOT:

  • Best Adult Cams
  • Live Porn
  • Adult Reviews
  • Adult Email Marketing
  • Discounted Porn
  • vr porn sites
  • European Adult Biz Magazine

FRIENDS OF YNOT:

  • Rabbits Reviews
  • XXX Job Interviews
  • Adult Site Broker
  • Femdom
  • Paid Porn Sites
  • Live Sex
  • Cam girl sites

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • 2018 YNOT Cam Awards Official Nominees
  • About YNOT
  • Adult Company Directory – Coming Soon
  • Advertise on YNOT
  • Attending the 2018 YNOT Cam Awards in Hollywood
  • Business Directory
    • Search
    • Submit Listing
    • Submit Listing
    • Submit Listing
    • YNOT Business Directory Submission
  • Claim Listing
  • Complaint Policy
  • Contact Editorial Team
  • DMCA Policy
  • Newsletters
  • Porn News & XXX Industry News
  • Privacy Policy for California Residents
  • Sitemap
  • Sitemap Categories
  • Support
  • YNOT Adult Affiliate Marketing Guide
    • Adult Affiliate Marketing for Beginners: A Basic Guide for Getting Started in 2023
    • Adult Affiliate Marketing Verticals Guide
    • Adult Email Marketing Best Practices
    • Buying Adult Email Lists: Why This is Always a Bad Idea
    • Key Concepts: Adult Affiliate Programs
    • Key Concepts: Adult Email Lists
    • Key Concepts: Landing Pages
    • Key Concepts: Sender Reputation
  • YNOT Cam Awards Nominee Information Page
  • YNOT Magazine: Issue 1, 2018
  • YNOT Party 2016 Austin – Event Page
  • YNOT Policy Regarding Social Media or Private Disputes
  • YNOT Privacy Policy
  • YNOT Terms and Conditions

Copyright © 2026 YNOT Group LLC.

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.