Blog Posts Tagged with "Medical Devices"

369dec31d888693bba6b6e0f39c14ce3

Healthcare Interrupted - Top Five Vulnerabilities Hackers Can Use Right Now To Shut Down Medical Devices

June 24, 2013 Added by:Matt Neely

By performing penetration tests on hospital networks and medical devices, security researchers have found that many commonly used devices are insecure and can be easily compromised.

Comments  (0)

A58bf865b185e0e3f665473bf8f3ca6d

Mobile Security Processes Could Be Applied to Medical Devices: Bluebox

May 10, 2013 Added by:Steve Ragan

Before malware could become a threat to medical devices, Adam Ely said attackers would have to write malware specifically targeted to these devices and organizations; or the devices would have to adopt a standard platforms and software.

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

GAO Invites FDA to Improve Information Security for Medical Devices

October 08, 2012 Added by:Pierluigi Paganini

In the last decade the number of cyber incidents related to technologies that surround us is growth exponentially, the principal concerns are related to all those objects with an "intelligent component" that we daily use expose on internet for different purposes...

Comments  (5)

E376ca757c1ebdfbca96615bf71247bb

Medical Device Security: This Time It’s Personal

June 22, 2012 Added by:shawn merdinger

The work done by security researchers on their own devices is only the beginning of what we can expect will be a deluge of medical device related vulnerabilities, and it’s worthwhile to explore some of the reasons as to why the current situation is the way it is now...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Bionic M2M: Are Skin-Mounted M2M the Future of eHealth?

May 19, 2012 Added by:Danny Lieberman

As their computing capabilities develop, current trusted computing/security models will be inadequate for epidermal electronics devices and attention needs to be devoted as soon as possible in order to build a security model that will mitigate threats by malicious attackers...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Implanted Medical Devices: Killed by Your App

May 17, 2012 Added by:Danny Lieberman

Danny Lieberman talks about the dangers of implanted cardiac devices (ICD) like pacemakers and other devices like insulin pumps, and considers that it’s only a question of time before we have a drive by execution of a politician with an implanted medical device...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Why Data Leaks

February 13, 2012 Added by:Danny Lieberman

The main reason is people. People handle electronic data and make mistakes or do not follow policies. People are increasing conscious that information has value – all information has some value to someone and that someone may be willing to pay...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Security and the Theory of Constraints

January 16, 2012 Added by:Danny Lieberman

Security management is tricky. It’s not only about technical controls and good software development practice. It’s also about management responsibility. If you remember the Theory of Constraints, there is only one thing that limits a system's (or company's) performance...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Medical Device Security: Killed by Code

January 04, 2012 Added by:Danny Lieberman

I’ve been talking to our medical device customers about mobile security of implanted devices for over a year now. I think it’s only a question of time before we have a drive by execution of a politician with an ICD (implanted cardiac device)...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Medical Device Security

December 27, 2011 Added by:Danny Lieberman

A threat analysis was performed on a medical device used in intensive care units. The analysis considers the security implications of deploying the devices inside a hospital network. Different stakeholders have different security and compliance concerns and therefore different agendas...

Comments  (0)

E376ca757c1ebdfbca96615bf71247bb

Medical Devices and Electromagnetic Interference

November 29, 2011 Added by:shawn merdinger

Enamored by technology, we tend to place tremendous faith in electronic gadgets that “just seem to work” – perhaps we are lulled into a sense of technical complacency by the general reliability of technology around us? Do we even have insight into the potential EMI problems?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Researcher Ups Ante on Hacking Medical Devices

October 31, 2011 Added by:Headlines

"You're not meant to be able to grab serial numbers out of the air. This tool I developed should be able to scan the frequency for these pumps, retrieve the pump ID, and with that pump I can then dispense insulin, suspend the pump, resume it and that type of thing..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Black Hat USA 2011 Presenters - A Live Webcast

August 24, 2011 Added by:Headlines

The organizers of the Black Hat USA 2011 conference which took place earlier this month are inviting those who attended and those who missed the event to join them for a live webcast featuring some of the conference's speakers. The free webcast airs on Thursday, Aug 25, 2011...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Medical Device Security in a Hospital Network

July 28, 2011 Added by:Danny Lieberman

Developing for embedded Linux is not copy and paste from Windows. It requires expertise to setup the basic infrastructure. But, once that infrastructure is up, the medical device developer and it’s hospital customer can be confident that they are standing on a secure platform...

Comments  (2)

959779642e6e758563e80b5d83150a9f

Why Windows is a Bad Idea for Medical Devices

July 12, 2011 Added by:Danny Lieberman

Vendors that use Windows for less critical devices are actually increasing the threat surface for a hospital since any Windows host can be a carrier of malware, regardless of it’s primary mission function, be it user-friend UI at a nursing station or intensive care monitor at the bedside...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Ban Windows from Embedded Medical Devices

June 24, 2011 Added by:Danny Lieberman

The combination of large numbers of software vulnerabilities, user lock in created by integrating applications with Windows, complexity of Microsoft products and their code and Microsoft predatory trade practices are diametrically different than Linux and the FOSS movement...

Comments  (0)

Page « < 1 - 2 > »
Most Liked