{"id":81709,"date":"2018-08-17T15:32:57","date_gmt":"2018-08-17T22:32:57","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=81709"},"modified":"2019-06-15T02:43:33","modified_gmt":"2019-06-15T09:43:33","slug":"exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks\/","title":{"rendered":"Intego exclusive: HP leaves Mac users vulnerable to fax hacks"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks\/hp-fax-machine-faxploit-flaw-mac\/\" rel=\"attachment wp-att-81925\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-81925\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/HP-Fax-Machine-Faxploit-Flaw-Mac.png\" alt=\"HP Leaves Mac Users Vulnerable to Fax Hacks\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/HP-Fax-Machine-Faxploit-Flaw-Mac.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/HP-Fax-Machine-Faxploit-Flaw-Mac-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/HP-Fax-Machine-Faxploit-Flaw-Mac-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p>On Sunday, at the annual DEF CON hacker conference, the world was warned about serious flaws that could allow an attacker to infiltrate a victim&#8217;s network via a fax machine.<\/p>\n<p>Researchers from Check Point <a href=\"https:\/\/blog.checkpoint.com\/2018\/08\/12\/faxploit-hp-printer-fax-exploit\/\" target=\"_blank\" rel=\"noopener\">released information<\/a> about the vulnerabilities they discovered in a wide range of HP multifunction and all-in-one printer devices that include fax capabilities.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/1VDZTjngNqs?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation\"><\/iframe><\/span><\/p>\n<p>The so-called &#8220;Faxploit&#8221; vulnerabilities had been responsibly disclosed, and HP had already released firmware updates for affected devices prior to Check Point&#8217;s public disclosure of the <a href=\"https:\/\/research.checkpoint.com\/sending-fax-back-to-the-dark-ages\/\" target=\"_blank\" rel=\"noopener\">full technical details<\/a>.<\/p>\n<p>However, HP seems to have made a serious oversight regarding their release of firmware updates.<\/p>\n<h3>HP Leaves Mac Users Vulnerable to Fax Hacks<\/h3>\n<p><img loading=\"lazy\" class=\"alignright wp-image-81760 size-medium\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/evil-face-hovering-over-fax-machine-212x300.png\" width=\"141\" height=\"200\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/evil-face-hovering-over-fax-machine-212x300.png 212w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/evil-face-hovering-over-fax-machine-106x150.png 106w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/evil-face-hovering-over-fax-machine.png 526w\" sizes=\"(max-width: 141px) 100vw, 141px\" \/>Oftentimes when HP releases firmware updates for printers and multifunction devices, the company only makes the firmware available in the form of an EXE file \u2014\u00a0a Windows application. In spite of the severity of the Faxploit bugs, HP has not made an exception to this unfortunate practice.<\/p>\n<p>Of the more than <a href=\"https:\/\/support.hp.com\/us-en\/document\/c06097712\" target=\"_blank\" rel=\"noopener\">150 affected models<\/a> for which HP released firmware updates, <strong>approximately one quarter of them do not have a Mac-compatible firmware update installer<\/strong> available to download through HP&#8217;s support site.\u00a0Later in this article\u00a0is a\u00a0complete list of devices for which Mac-compatible firmware installation methods\u00a0are not currently available.<\/p>\n<p>This leaves\u00a0companies and home users that only use macOS or Linux in a difficult position: unplug your fax line, or remain vulnerable to serious attacks.<\/p>\n<h3>Fax Is, Surprisingly, Still Relevant<\/h3>\n<p>Although fax is an antiquated technology by today&#8217;s standards, a surprising number of businesses and homes still rely on the technology.<\/p>\n<p>The health care, legal, and real estate industries, and many government entities, continue to use fax machines to transmit facsimilies of sensitive printed documents. Check Point estimates that &#8220;hundreds of millions&#8221; of fax machines are still in use worldwide.<\/p>\n<h3>What Can Mac Users Do\u00a0About Affected Devices?<\/h3>\n<p>Check Point said earlier this week that the vulnerability was not known to be exploited in the wild yet. However, now that details have been made available to the public, and given that a plethora of potentially interesting targets openly share their fax numbers with the world, it is rather risky to keep a known-affected fax machine plugged into a landline.<\/p>\n<div id=\"attachment_81742\" style=\"width: 1320px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-81742\" loading=\"lazy\" class=\"size-full wp-image-81742\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/CheckPoint-fax-exploit-attack-flow.png\" alt=\"\" width=\"1310\" height=\"572\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/CheckPoint-fax-exploit-attack-flow.png 1310w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/CheckPoint-fax-exploit-attack-flow-150x65.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/CheckPoint-fax-exploit-attack-flow-300x131.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/CheckPoint-fax-exploit-attack-flow-768x335.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/CheckPoint-fax-exploit-attack-flow-1024x447.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/CheckPoint-fax-exploit-attack-flow-657x287.png 657w\" sizes=\"(max-width: 1310px) 100vw, 1310px\" \/><p id=\"caption-attachment-81742\" class=\"wp-caption-text\">How a Faxploit attack works. Image: <a href=\"https:\/\/blog.checkpoint.com\/2018\/08\/12\/faxploit-hp-printer-fax-exploit\/\" target=\"_blank\" rel=\"noopener\">Check Point<\/a><\/p><\/div>\n<p>If you have an affected device, but do not have access to a Windows computer, you may have a few options.<\/p>\n<h4><strong>Use Boot Camp or a Windows VM<\/strong><\/h4>\n<p><img loading=\"lazy\" class=\"alignright wp-image-74026 size-thumbnail\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Windows-BSOD-Apple-icon-150x150.png\" alt=\"Apple's icon depicting Windows Blue Screen of Death\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Windows-BSOD-Apple-icon-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Windows-BSOD-Apple-icon-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Windows-BSOD-Apple-icon-768x768.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Windows-BSOD-Apple-icon-657x657.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Windows-BSOD-Apple-icon-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Windows-BSOD-Apple-icon-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Windows-BSOD-Apple-icon-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Windows-BSOD-Apple-icon-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Windows-BSOD-Apple-icon-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Windows-BSOD-Apple-icon.png 1024w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>If you happen to have Boot Camp already set up on your Mac, reboot into Windows to install the firmware update. If you do not have Boot Camp set up, you can buy a copy of Windows and then run the Boot Camp Assistant app to install Windows onto your Mac. Apple&#8217;s support site has <a href=\"https:\/\/support.apple.com\/en-us\/HT201468\" target=\"_blank\" rel=\"noopener\">instructions<\/a> on how to set up Boot Camp and install Windows.<\/p>\n<p>Regarding the safety and efficacy of installing the firmware\u00a0via a Windows virtual machine (i.e. via software such as\u00a0VMware Fusion, Parallels Desktop, or Oracle VirtualBox), an\u00a0HP\u00a0representative told us,\u00a0&#8220;It is safe to run the Windows\u00a0compatible firmware update utilities on a Windows-based virtual machine running on Mac OS or OS X. The firmware updaters can find printers over both networked and USB connections.&#8221;<\/p>\n<h4><strong>Unplug when not in use<\/strong><\/h4>\n<p><img loading=\"lazy\" class=\"alignright wp-image-81769 size-thumbnail\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/unplugged-phone-cable-150x85.png\" width=\"150\" height=\"85\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/unplugged-phone-cable-150x85.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/unplugged-phone-cable-300x171.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/unplugged-phone-cable-768x438.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/unplugged-phone-cable-1024x583.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/unplugged-phone-cable-657x374.png 657w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>For home users and small businesses, if you primarily use your fax machine to send faxes but not to receive faxes, it is best to disconnect the phone line from your fax machine or multifunction printer and leave it unplugged when not in use. When you are expecting a fax, you can reconnect the landline to the machine until you receive the desired fax, and then unplug the phone cord from the machine again.<\/p>\n<h4><strong>Other\u00a0solutions<\/strong><\/h4>\n<p>For\u00a0organizations that rely on receiving frequent faxes, leaving the fax machine unplugged may not be an option. You will need to weigh the risks, and consider whether to bring in a technical support consultant with a Windows laptop to install the firmware update for you, or wait and see if HP releases a Mac-compatible firmware update method for your device; otherwise, you may\u00a0consider replacing your fax machine with a different brand or model that is not (yet) known to be affected by Faxploit or similar vulnerabilities.<\/p>\n<h3>Affected Models<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-81775\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/HP-logo-2012-150x150.png\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/HP-logo-2012-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/HP-logo-2012-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/HP-logo-2012-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/HP-logo-2012-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/HP-logo-2012-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/HP-logo-2012-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/HP-logo-2012-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/HP-logo-2012.png 480w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>HP has made a list of <a href=\"https:\/\/support.hp.com\/us-en\/document\/c06097712\" target=\"_blank\" rel=\"noopener\">all\u00a0devices known to be affected<\/a> by the Faxploit vulnerabilities, which includes\u00a0more than\u00a0150 devices in total. About three quarters of these devices have a firmware update available that can be installed from a Mac.<\/p>\n<p>Following is\u00a0a list of\u00a0HP multifunction devices\u00a0for which\u00a0the manufacturer\u00a0is not currently offering a macOS-compatible firmware update method:<\/p>\n<ul>\n<li>HP Deskjet 4615 All-in-One Printer<\/li>\n<li>HP DeskJet 5000 series<\/li>\n<li>HP DeskJet 5275 All-in-One Printer<\/li>\n<li>HP ENVY 5000 All-in-One Printer series<\/li>\n<li>HP ENVY Photo 6200 All-in-One Printer series<\/li>\n<li>HP ENVY Photo 7100 All-in-One Printer series<\/li>\n<li>HP Officejet 4610 All-in-One Printer series<\/li>\n<li>HP OfficeJet 5200 All-in-One Printer series<\/li>\n<li>HP Officejet 6220*<\/li>\n<li>HP Officejet Pro 251dw Printer series<\/li>\n<li>HP Officejet Pro 3610 e-All-in-One Printer series<\/li>\n<li>HP Officejet Pro 3620 e-All-in-One Printer series<\/li>\n<li>HP OfficeJet Pro 7720 Wide Format All-in-One Printer series<\/li>\n<li>HP OfficeJet Pro 7730 Wide Format All-in-One Printer series<\/li>\n<li>HP OfficeJet Pro 7740 Wide Format All-in-One Printer series<\/li>\n<li>HP OfficeJet Pro 8210 Printer series<\/li>\n<li>HP OfficeJet Pro 8216 Printer<\/li>\n<li>HP Officejet Pro 8600 e-All-in-One Printer series<\/li>\n<li>HP Officejet Pro 8600 Plus e-All-in-One Printer series<\/li>\n<li>HP Officejet Pro 8600 Premium e-All-in-One Printer series<\/li>\n<li>HP OfficeJet Pro 8730 All-in-One Printer series<\/li>\n<li>HP OfficeJet Pro 8732M All-in-One Printer<\/li>\n<li>HP OfficeJet Pro 8740 All-in-One Printer series<\/li>\n<li>HP Officejet Pro X451 Printer series<\/li>\n<li>HP Officejet Pro X476 MFP series<\/li>\n<li>HP Officejet Pro X551 Printer series<\/li>\n<li>HP Officejet Pro X576 MFP series<\/li>\n<li>HP PageWide 352dw Printer series<\/li>\n<li>HP PageWide 377dw MFP<\/li>\n<li>HP PageWide Managed P55250dw Printer series<\/li>\n<li>HP PageWide Managed P57750dw MFP series<\/li>\n<li>HP PageWide Pro 452dn Printer series<\/li>\n<li>HP PageWide Pro 452dw Printer series<\/li>\n<li>HP PageWide Pro 477dn MFP series<\/li>\n<li>HP PageWide Pro 477dw MFP series<\/li>\n<li>HP PageWide Pro 552dw Printer series<\/li>\n<li>HP PageWide Pro 577dw MFP series<\/li>\n<li>HP PageWide Pro 577z MFP series<\/li>\n<\/ul>\n<p>*Although HP lists the Officejet 6220 as\u00a0an affected device, it doesn&#8217;t appear in HP&#8217;s software and drivers search results, so even Windows users may not have a way to update its firmware. HP\u00a0has not responded to a request for clarification about this model.<\/p>\n<h3>HP&#8217;s Response to Intego<\/h3>\n<p>Shortly before publication time, an HP representative responded to our inquiries stating that it&#8217;s safe to install the firmware from a Windows\u00a0virtual machine running on a Mac. Of course, this requires the purchase and installation of Windows, which\u00a0is not practical for all Mac users.<\/p>\n<p>As\u00a0for whether\u00a0HP will release macOS-compatible firmware updates for\u00a0the\u00a0affected devices listed above, the representative only stated that there are &#8220;more [Mac firmware updates] to be released,&#8221; but did not specify which specific devices would\u00a0get Mac-compatible\u00a0updates, or when those updates might become available.<\/p>\n<p>This article will be updated if\u00a0HP\u00a0provides\u00a0further information or clarifications.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; On Sunday, at the annual DEF CON hacker conference, the world was warned about serious flaws that could allow an attacker to infiltrate a victim&#8217;s network via a fax machine. Researchers from Check Point released information about the vulnerabilities they discovered in a wide range of HP multifunction and all-in-one printer devices that include [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":81928,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[151,13,5],"tags":[4267,4279,4270,4282,1120,4273,174,143],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"&nbsp; On Sunday, at the annual DEF CON hacker conference, the world was warned about serious flaws that could allow an attacker to infiltrate a victim&#039;s\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Intego exclusive: HP leaves Mac users vulnerable to fax hacks - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"&nbsp; On Sunday, at the annual DEF CON hacker conference, the world was warned about serious flaws that could allow an attacker to infiltrate a victim&#039;s\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-17T22:32:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-06-15T09:43:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/HP-Faxploit-Flaw-Mac-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/HP-Faxploit-Flaw-Mac-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/HP-Faxploit-Flaw-Mac-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"HP Faxploit Flaw Mac\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks\/\",\"name\":\"Intego exclusive: HP leaves Mac users vulnerable to fax hacks - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks\/#primaryimage\"},\"datePublished\":\"2018-08-17T22:32:57+00:00\",\"dateModified\":\"2019-06-15T09:43:33+00:00\",\"description\":\"&nbsp; On Sunday, at the annual DEF CON hacker conference, the world was warned about serious flaws that could allow an attacker to infiltrate a victim's\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Intego exclusive: HP leaves Mac users vulnerable to fax hacks\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Intego exclusive: HP leaves Mac users vulnerable to fax hacks\",\"datePublished\":\"2018-08-17T22:32:57+00:00\",\"dateModified\":\"2019-06-15T09:43:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks\/#webpage\"},\"wordCount\":1165,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/HP-Faxploit-Flaw-Mac-Featured.png\",\"keywords\":[\"fax\",\"fax machine\",\"Faxploit\",\"firmware\",\"Hack\",\"HP\",\"Mac\",\"Vulnerabilities\"],\"articleSection\":[\"Recommended\",\"Security &amp; Privacy\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"&nbsp; On Sunday, at the annual DEF CON hacker conference, the world was warned about serious flaws that could allow an attacker to infiltrate a victim's","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks\/","og_locale":"en_US","og_type":"article","og_title":"Intego exclusive: HP leaves Mac users vulnerable to fax hacks - The Mac Security Blog","og_description":"&nbsp; On Sunday, at the annual DEF CON hacker conference, the world was warned about serious flaws that could allow an attacker to infiltrate a victim's","og_url":"https:\/\/www.intego.com\/mac-security-blog\/exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2018-08-17T22:32:57+00:00","article_modified_time":"2019-06-15T09:43:33+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/HP-Faxploit-Flaw-Mac-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/HP-Faxploit-Flaw-Mac-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/HP-Faxploit-Flaw-Mac-Featured.png","width":400,"height":260,"caption":"HP Faxploit Flaw Mac"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks\/","name":"Intego exclusive: HP leaves Mac users vulnerable to fax hacks - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks\/#primaryimage"},"datePublished":"2018-08-17T22:32:57+00:00","dateModified":"2019-06-15T09:43:33+00:00","description":"&nbsp; On Sunday, at the annual DEF CON hacker conference, the world was warned about serious flaws that could allow an attacker to infiltrate a victim's","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Intego exclusive: HP leaves Mac users vulnerable to fax hacks"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Intego exclusive: HP leaves Mac users vulnerable to fax hacks","datePublished":"2018-08-17T22:32:57+00:00","dateModified":"2019-06-15T09:43:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks\/#webpage"},"wordCount":1165,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/HP-Faxploit-Flaw-Mac-Featured.png","keywords":["fax","fax machine","Faxploit","firmware","Hack","HP","Mac","Vulnerabilities"],"articleSection":["Recommended","Security &amp; Privacy","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/exclusive-hp-leaves-mac-users-vulnerable-to-fax-hacks\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/08\/HP-Faxploit-Flaw-Mac-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-lfT","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/81709"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=81709"}],"version-history":[{"count":13,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/81709\/revisions"}],"predecessor-version":[{"id":88180,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/81709\/revisions\/88180"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/81928"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=81709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=81709"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=81709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}