Telehealth: A New Frontier in Medicine—and Security
This report contains statistics and observations on vulnerabilities, phishing schemes and malware related to telehealth. Continue reading Telehealth: A New Frontier in Medicine—and Security
Collaborate Disseminate
This report contains statistics and observations on vulnerabilities, phishing schemes and malware related to telehealth. Continue reading Telehealth: A New Frontier in Medicine—and Security
It’s time to overview our last year’s forecasting for the healthcare sector and make some new predictions for 2022 Continue reading The dangers of “connected” healthcare: predictions for 2022
As the COVID-19 crisis grinds on, some threat actors are trying to speed up vaccine development by any means available. We have found evidence that actors, such as the Lazarus group, are going after intelligence that could help these efforts by attacking entities related to COVID-19 research. Continue reading Lazarus covets COVID-19-related intelligence
The pandemic has turned 2020 into a year of medicine and information technology. The remarkable surge in the criticality level of medical infrastructure, coupled with feasible across-the-board digitalization, led to many of our last year’s predictions coming true much sooner than expected. Continue reading Healthcare security in 2021
As an incident response service provider, Kaspersky delivers a global service that results in a global visibility of adversaries’ cyber-incident tactics and techniques on the wild. In this report, we share our teams’ conclusions and analysis based on incident responses and statistics from 2019. Continue reading Incident Response Analyst Report 2019
More than two years after the infamous Wannacry ransomware crippled medical facilities and other organizations worldwide, the healthcare sector seems to be learning its lesson, as the number of attacked medical devices in 2019 decreased globally. Continue reading Cybersecurity of connected healthcare 2020: Overview and predictions
Like other IoT devices, the prosthetic arm sends statistics to the cloud, such as movement amplitudes, the arm’s positions, etc. And just like other IoT devices, this valuable invention must be checked for vulnerabilities. In our research, we focused on those attack vectors that can be implemented without the arm owner’s knowledge. Continue reading How to Attack and Defend a Prosthetic Arm
To better understand the potential future threat landscape facing memory implants, researchers from Kaspersky Lab and the University of Oxford Functional Neurosurgery Group have undertaken a practical and theoretical threat review of existing neurostimulators and their supporting infrastructure. Continue reading Hackers attacking your memories: science fiction or future threat?