On 11/29/2011 12:16 PM, Andrew S. Baker wrote: > It appears to be a legitimate threat vector, but I do wish the > researchers didn't wax so dramatic the whole time... > > "The problem is, technology companies aren't really looking into this > corner of the Internet. But we are," said Columbia professor Salvatore > Stolfo, who directed the research in the Computer Science Department > of Columbia University’s School of Engineering and Applied Science. > “The research on this is crystal clear. The impact of this is very > large. These devices are completely open and available to be exploited.” > > “It's like selling a car without selling the keys to lock it,” Stolfo > said. “It’s totally insecure.” > > > > Unnecessary sensationalism, when the underlying point is valid enough.
I can see it being a risk, if the same exploit (or similar) allowed an attacker access to documents scanned on such devices, for example. That would be a way for industrial espionage. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
