11 Hackable Medical Devices Posing Real Threats

DZone 's Guide to

11 Hackable Medical Devices Posing Real Threats

It sounds like something out of science fiction, but you can now hack pacemakers, insulin pumps, etc. IoT medical devices are causing a huge problem for the sec industry.

· Security Zone ·
Free Resource

Within the last year, you've likely read a few posts about hackable pacemakers and insulin pumps detailing scary and real threats to common medical devices. In addition to the known hackable IoT medical devices, there are many not-so-common devices that pose legitimate threats when (not if) hacked. In all corners of the world, they sit silently poised as potential vectors for botnet or ransomware attacks.

According to the "Healthcare's IoT Dilemma: Connected Medical Devices" report by Forrester, “You have less control over connected medical devices than any other aspect of your technology environment." The report also notes, “Many times, vendors control patch and update cycles, and vulnerabilities persist that require segmentation from your network. Considering that many of these devices are in direct contact with patients, this is a major cause for concern.”

Another article on WIRED quotes May Wang, chief technology officer at Zingbox, who states, "For the past three years the healthcare sector has been hacked even more than the financial sector. And more and more hacking incidents are targeting medical devices.”

It's hard to ignore that insecure medical devices will play starring roles in upcoming massive hacks, so companies are starting to zero in on security down to the lowest level - the firmware.

Get familiar with this list of 11 Uncommon Hackable Connected Medical Devices Posing Real Threats. It was built through research and conversations with manufacturers. Imagine the hundreds of connected medical devices that aren't on the list (yet):

  1. Brain Implants
  2. Vital Monitors
  3. Medication Dispensers
  4. MRI Scanners
  5. Blood Flow Sensors
  6. Smart Hospital Beds
  7. Gastric Simulators
  8. Foot Drop Implants
  9. Cochlear Implants
  10. Infusion Pumps
  11. Surgical Robots

Companies who want to protect their data, their networks, their brand and the healthcare industry at large from senseless and dangerous cyberattacks will take steps to properly code and reverse engineer their firmware, checking for all security holes that malicious hackers will unquestionably find.

connected devices ,iot security ,security

Published at DZone with permission of Gina Palladino , DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}