Researchers from universities in Belgium and the UK have published research showing that a wide range of implantable medical devices, including implantable defibrillators are still vulnerable to wireless snooping and denial of service attacks. The research, which mimicked the work of a naive (or “weak”) adversary, found that few security protections have been added to such devices, years after researchers first demonstrated that they are vulnerable to wireless attacks and other manipulation. The discoveries apply to at least 10 types of implantable cardiac defibrillators (ICDs) that are currently on the market, though the devices and manufacturers are not named. The researchers, from Katholieke Universiteit te Leuven in Belgium (KU Leuven) and the University of Birmingham in the United Kingdom echoes the claims made by the firm MedSec earlier this year, which warned of security holes in ICD devices made by St. Jude in August. That research was the foundation of a call […]
Hardware
Home wireless networks are set for a makeover
In-brief: In our latest Security Ledger podcast, we talk with Luma founder and CEO Paul Judge, a serial entrepreneur (Ciphertrust, Purewire, Pindrop) whose latest venture seeks to bring enterprise-quality wireless to the home market, improving both security and management along the way.
Report: Millions (and Millions) of Devices Vulnerable in latest Mirai Attacks
In-brief: Attacks that took 900,000 broadband routers offline in Germany have hit other countries as well, as security experts warn that the number of devices vulnerable to attack could number in the millions.
Department of Defense Sets Ground Rules for Hackers
In-brief: The U.S. Department of Defense published guidelines on Monday for independent security researchers to disclose vulnerabilities in DoD’s public facing systems. The program, managed by the firm HackerOne, provides a legal route for hackers to disclose vulnerabilities to the military.
Survey Sounds More Alarms on Internet of Things in the Enterprise
In-brief: A survey of customer networks by the firm zScaler found that cameras, printers, video recorders and other devices are common – and often easy to snoop on and attack.