Hands-On Mac (Video)

HOA 189: macOS Printers & Scanners

11 min • 3 juli 2025

Cybersecurity researchers have uncovered a serious flaw affecting nearly 700 Brother printer models that allows attackers to extract serial numbers and generate admin passwords without any authentication. Host Mikah Sargent walks through the step-by-step process of securing your Mac-connected printer using built-in macOS tools to access your printer's web interface and change those dangerous default passwords.

  • Major Printer Security Vulnerability Discovered - Rapid7 cybersecurity company found flaws affecting Brother, Toshiba, and Fujifilm printers, with 689 Brother models impacted by the most serious vulnerability
  • How the Attack Works - Bad actors can access printers without authentication, extract serial numbers, and use them to generate default admin passwords since manufacturers use predictable password generation methods
  • Viewing Printer Details and Options - How to check printer queue, sharing settings, driver information, and supply levels through the macOS interface for connected Brother printers
  • Opening Your Printer's Web Interface - Step-by-step guide to accessing the "Show Printer Web Page" option to reach your printer's built-in web server for advanced configuration
  • Checking and Updating Firmware - Importance of keeping printer firmware current, though updates don't completely solve the manufacturing-level vulnerability that requires Brother to address
  • Changing Default Admin Passwords - Critical security step of accessing the administrator login settings through the printer's web interface to replace factory default credentials

Host: Mikah Sargent

Download or subscribe to Hands-On Apple at https://twit.tv/shows/hands-on-apple

Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit

Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.

Senaste avsnitt

Podcastbild

00:00 -00:00
00:00 -00:00