HP

7 out of top 10 “Internet of Things” devices riddled with vulnerabilities

It is becoming increasingly common to find yourself typing a WiFI password not just into your smartphone, but also your smoke alarm, your fridge, your printer, your baby monitor and maybe even your car. However, are the manufacturers of these internet-enabled devices paying proper care and attention to security and privacy?

HP Printer security flaw allows hackers to extract passwords

Owners of certain HP LaserJet Pro printers are being advised to protect themselves against a security vulnerability “as soon as possible”, after researchers found it was possible to remotely access admin passwords and other information.

Has your Hewlett-Packard ScanJet printer just tried to infect your PC with malware?

Beware! Cybercriminals have attempted to infect computers worldwide, disguising their attack as an email claiming to come from a scanner in your office.

Malware attack spread as email from your office’s HP scanner

Cybercriminals are attempting to infect computers around the world, disguising their attack as an email claiming to come from a scanner in your office.

Malware: ‘Scan from a HP OfficeJet’ attack spammed out widely

A malware attack cloaks its true intentions by posing as an emailed scan from a printer.

Would your users click on the attachment without thinking twice?

HP patches printer firmware flaw, but leaves customers guessing

There’s a serious security vulnerability on some HP LaserJet printers.

The good news is that it’s now been patched.

The bad news is that you don’t know if your HP LaserJet printer needs the fix – because HP hasn’t told you.

HP LaserJet printers at risk of fiery hacker attack

Researchers claim to have discovered a security vulnerability in “tens of millions” of HP LaserJet printers that could allow a remote hacker to install malicious firmware.

Have you patched your printer?

Read more in my article at Naked Security.

Symantec and HP lose laptops – workers warned of identity theft risk

Read more in my article at Naked Security.