Dimon is making his own bet on a digital coin that could transform the global payments landscape: JPM Coin.Financeread more
The Dow slipped from a record high set earlier in the day after President Trump cast doubt on the trade progress between China and the U.S.US Marketsread more
The U.S. and China have restarted their trade talks, but signs are showing a deal could be even harder to reach now.Marketsread more
Goldman Sachs' transition from the bank of choice for millionaires to a more inclusive, consumer friendly shop isn't cheap.Financeread more
KeyCorp said in an 8-K filing the fraud involves a "business customer" and was discovered "on or about" July 9.Banksread more
The Trump administration "will take a look" after billionaire investor Peter Thiel said the FBI and CIA should see if Chinese intelligence has infiltrated Google.Technologyread more
On Monday, the first day of Amazon's 48-hour shopping extravaganza this year, retailers that make more than $1 billion in annual revenues saw a 64% increase in their digital...Retailread more
Builder confidence for single-family homes rose just one point to 65 in July, according to the National Association of Home Builders/Wells Fargo Housing Market Index (HMI)....Real Estateread more
Expectations for lower interest rates and less fear about tariffs sent investors back into the market and set up what could be a profitable run ahead.Marketsread more
Johnson & Johnson vowed to defend itself against lawsuits alleging the company fueled the opioid crisis and that its namesake talc-based baby powder caused ovarian cancer and...Health and Scienceread more
Southwest Airlines is delaying pilot hiring and captain upgrades with no end in sight to the grounding of the Boeing 737 Max.Airlinesread more
In an age of instant communication over the internet, the fax machine is seen as an archaic piece of technology. But it could potentially prove to be a gold mine for hackers looking to steal company secrets.
Researchers at Nasdaq-listed Check Point Software Technologies said that fax machines — which still reside in many offices — have serious security flaws. Those vulnerabilities could potentially allow an attacker to steal sensitive files through a company's network using just a phone line and a fax number.
In a report released on Sunday, Check Point researchers showed how they were able to exploit security flaws present in a Hewlett Packard all-in-one printer. Standalone fax machines are a rarity in companies today, but the fax function is still present in commonplace all-in-one printers.
They faxed over lines of malicious code disguised as an image file to the printer, relying on the fact that no one usually checks the contents received over a fax. The file was decoded and stored in the printer's memory, which allowed the researchers to take over the machine. From there, they were able to infiltrate the entire computer network to which the printer was connected.
Today, companies invest heavily to fortify their networks using the latest technologies available. Security firms such as U.K.-based Darktrace believe that artificial intelligence is key to tackling cyber threats. But most of that effort is concentrated in parts of the network that hold the most sensitive files, leaving less important areas — like the all-in-one printers — more vulnerable to attacks.
As faxing is done over the phone line, that ability presents a "new attack vector" in the cyber threat landscape, according to the Check Point researchers.
HP fixed the vulnerability before the report was published, but the researchers said all-in-one printers from other companies could still have similar security flaws.
Some reports estimate that there are about 46 million active fax machines and around 17 million of them are in the United States. The medical community is still heavily reliant on fax machines and part of that boils down to tradition, where some feel more at ease with the technology. Fax technology is also considered safe and secure under today's privacy laws.
To protect themselves, companies should consider segmenting their computer network into sub-networks, the Check Point researchers said. They should keep sensitive files in a sub-network that's separate from the one to which printers are connected.