Researchers warn of Consequences from ‘Printjack’ Printer attacks

A team of Italian researchers has compiled a set of three attacks called ‘Printjack’ Printer attacks,’ warning users of the significant consequences of over-trusting their printer. The attacks include recruiting the printers in DDoS swarms, imposing a paper DoS state, and performing privacy breaches. As the researchers point out, modern printers are still vulnerable to

How to Conduct a Cyber Security Risk Assessment

Cyber Security Risk Assessment is defined by NIST as risk assessments that are used to identify, estimate, and prioritize risk to organizational operations, organizational assets, individuals, other organizations, and the Nation, resulting from the operation and use of information systems. The primary purpose of a cyber security risk assessment is to keep stakeholders informed and