Since printers are connected to the network, they can be vulnerable. Attackers might use a printer connection to get to other parts of a system, and sometimes it's very easy to get into a company that way.
More Quotes from Thomas Kristensen:
This is big problem because a very large number of corporations use Lotus Notes. When users receive an e-mail with an attachment, all they have to do is click on the attachment to read it, and their systems are vulnerable to a remote attack.Thomas Kristensen
I don't think many software vendors would be willing to run the risk of deliberately placing a back door in their software. The benefits compared to the huge risk of disclosure simply aren't worth it.
Thomas Kristensen
Three of the vulnerabilities can launch malicious code that allows an attacker to snoop on users. The other vulnerability is a DOS attack that will only work in a few cases and crash the media player when it tries to open a file.
Thomas Kristensen
Vendors can take months to create patches, and sometimes users grumble about that, ... But the alternative is to have patches that can be circumvented or aren't appropriate for the vulnerability. It's a difficult balance.
Thomas Kristensen
Because of all the barriers, it just seems like virus writers won't bother unless they see Macs as some kind of new frontier. Even then, few won't want to put in that kind of time and effort.
Thomas Kristensen
I think Steve has got some good points on why comparing vulnerability numbers is difficult.
Thomas Kristensen
Readers Who Like This Quotation Also Like:
Each person's life is lived as a series of conversations.Deborah Tannen
I believe some people in this business suffer from fame because they behave in a famous fashion.
Stephen Rea
I have a critical nature, in the sense that when I look at something I often look for the flaws.
Donald Fagen