How to Protect Medical Devices from Ransomware

Cyberattacks on hospitals are rising, and patients are worried. Is my personal data at risk? Could ransomware or hackers effectively shut down the ER near me?  Consider these findings from a March 2021 report by cybersecurity provider Morphisec:   Abo… Continue reading How to Protect Medical Devices from Ransomware

Hacking medical devices: Five ways to inoculate yourself from attacks

Healthcare companies must follow medical device security best practices to defend against attacks on devices and the networks and systems they connect to.
The post Hacking medical devices: Five ways to inoculate yourself from attacks appeared first o… Continue reading Hacking medical devices: Five ways to inoculate yourself from attacks

Survey Finds Low Confidence in Medical Device Security

As more medical devices connect to the Internet, the role of cybersecurity in the health care sector has never been more critical. Unfortunately, a survey of 50 senior executives at U.S. Fortune 1000 companies found only 18% of respondents believed th… Continue reading Survey Finds Low Confidence in Medical Device Security

Uncover SweynTooth vulnerabilities with Defensics fuzz testing

SweynTooth is a set of Bluetooth Low Energy vulnerabilities. We can reproduce many of these vulnerabilities using Defensics Bluetooth LE Test Suites.
The post Uncover SweynTooth vulnerabilities with Defensics fuzz testing appeared first on Software In… Continue reading Uncover SweynTooth vulnerabilities with Defensics fuzz testing

DEF CON 27, Artificial Intelligence Village – Yisroel Mirsky’s ‘Automated Injection And Removal Of Medical Evidence in CT And MRI Scans’

Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn.
Permalink
The post DEF CON 27, Artificial Intelligence Village – Yisroel M… Continue reading DEF CON 27, Artificial Intelligence Village – Yisroel Mirsky’s ‘Automated Injection And Removal Of Medical Evidence in CT And MRI Scans’

DEF CON 27, Bio Hacking Village, Dr Avi Rubin’s ‘Beyond The Firmware: The Attack Surface of a Networked Medical Device’

Thanks to Def Con 27 Volunteers, Videographers and Presenters for publishing their superlative conference videos via their YouTube Channel for all to see, enjoy and learn.
Permalink
The post DEF CON 27, Bio Hacking Village, Dr Avi Rubin’s &#8216… Continue reading DEF CON 27, Bio Hacking Village, Dr Avi Rubin’s ‘Beyond The Firmware: The Attack Surface of a Networked Medical Device’