On 11/29/2011 12:16 PM, Andrew S. Baker wrote:
> It appears to be a legitimate threat vector, but I do wish the 
> researchers didn't wax so dramatic the whole time...
>
> "The problem is, technology companies aren't really looking into this 
> corner of the Internet. But we are," said Columbia professor Salvatore 
> Stolfo, who directed the research in the Computer Science Department 
> of Columbia University’s School of Engineering and Applied Science. 
> “The research on this is crystal clear.  The impact of this is very 
> large. These devices are completely open and available to be exploited.”
>
> “It's like selling a car without selling the keys to lock it,” Stolfo 
> said. “It’s totally insecure.”
>
>
>
> Unnecessary sensationalism, when the underlying point is valid enough.

I can see it being a risk, if the same exploit (or similar) allowed an 
attacker access to documents scanned on such devices, for example. That 
would be a way for industrial espionage.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to