that Wi-Fi connection settings stored in the memory of some of its inkjet printers may not be deleted by the usual initialization process and pose a security risk when disposed of.
The number of printers this vulnerability affects is massive and encompasses 196 total models. It includes the home and business E, G, GM, GX, iB, iP, MB, MG, MX, TR, TS, and XK inkjet series as well as the Pro series photo printers . It also affects some large format printers including Canon’s Pro line as well as the TM, TX, GP, and TC series printers.
Basically, the printers typically retain all the information a malicious third party would need in order to gain access to a private network. From there, they could access shared resources, steal data, or launch any number of attacks on a user’s privacy. If a user intends to let a Canon printer out of their house for any reason, Canon recommends the following steps to truly reset and clear the data stored on the device:If a printer doesn’t have the “Reset all” function, users can mitigate the issue through the following alternative steps:If a particular printer doesn’t allow for either of these approaches, Canon recommends owners refer to the instruction manual that came with the device for specific Reset all or Reset LAN settings.
United States Latest News, United States Headlines
Similar News:You can also read news stories similar to this one that we have collected from other news sources.
Source: screenrant - 🏆 7. / 94 Read more »
Source: RollingStone - 🏆 483. / 51 Read more »
Source: screenrant - 🏆 7. / 94 Read more »
Source: RollingStone - 🏆 483. / 51 Read more »
Source: screenrant - 🏆 7. / 94 Read more »
Source: Gizmodo - 🏆 556. / 51 Read more »