Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

David M. Lay

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why Heart Attack Victims Should Be Wary of Hacking Attacks

Why Heart Attack Victims Should Be Wary of Hacking Attacks

It goes without saying that having to rely on a pacemaker isn’t an ideal circumstance for anyone, even considering that the device allows the patient to continue living a fulfilling life. This is why a particular discovery of a European-based research team becomes a shade or two darker: the team has concluded that it’s possible for a novice to send life-threatening signals to the device.

As a note of the results of their research into implantable cardioverter defibrillators (ICDs) the researchers described the potential dangers of ICD technology.

Pacemakers feature the capability to communicate with external technologies after being activated by a special magnetized device. This capability is generally of benefit to the patient, as their device can be read without an invasive procedure. However, if the patient is out of the doctor’s office within two hours, their pacemaker is still able to receive signals and instructions from any device. This puts the patient themselves at risk of a specialized cyber attack.

This risk can then be exacerbated by the attacker. By sending a signal to the pacemaker device, the device can be kept from returning to “sleep” mode, leaving it vulnerable to more attacks. During their studies, the researchers discovered how wide of a range these attacks could fall under.

Simply by analyzing the signals that the tested devices communicated with their equipment, the team was able to devise a variety of ill-meaning uses for a criminal to take advantage of. Capable of draining the device’s battery or reading the personally identifiable information stored upon it in the patient’s onboard medical records, a cyber criminal could easily make their target’s life miserable. Scarier still, the right message sent to the pacemaker could even turn it off, or activate its heart-shocking features unnecessarily.

The team confirmed that at least 10 varieties of the lifesaving device were vulnerable to the relatively very simple form of attack, without requiring any knowledge of the device itself. Scarier still, they were able to determine why the pacemakers were so vulnerable in the first place.

Putting it very simply, the manufacturers of the devices had relied on the lifesaving pacemakers just not being an obvious target for cyber criminals, and had therefore been satisfied without building a lot of IT security into them. It was this mentality of “nobody will consider this a target” that led to pacemakers becoming a target.
Now, as scary as this story is, this was fortunately conducted by researchers, and not dangerous criminals. Regardless, it’s still pretty unnerving.

So now every business owner should ask: Have I considered that my business might be a target?

Many SMBs hold the same mistaken impression as the pacemaker manufacturers do: there are bigger, more valuable, more obvious targets than my business, so I don’t need to worry about security so much. Unfortunately for these businesses, they are proven wrong so many times.

If you’re unsure of your level of IT security preparedness, give A PC Geek a call at (469) 567-0181. We can help you keep your IT optimally secure, and securely optimized.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 26 May 2019
If you'd like to register, please fill in the username, password and name fields.

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Software Business Computing Google Business Workplace Tips Windows 10 Miscellaneous Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing User Tips Communication IT Support VoIP Business Management Server Network Smartphone Data Quick Tips Email Holiday Virtualization Going Green Remote Computing Business Continuity Operating System Mobile Device Management Social Media Upgrade Saving Money Office Disaster Recovery Apps Alert Save Money Chrome Small Business Android Antivirus Application The Internet of Things Big Data Best Practice Managed Service Provider Microsoft Office Mobility Employer-Employee Relationship Ransomware Social Facebook WiFi Identity Theft Information Technology Law Enforcement Spam Office Tips Bandwidth Password Unified Threat Management BYOD Hacking Tablet Passwords Analytics History Search Gmail Browser Saving Time Current Events Government Lithium-ion battery Printer Fraud Avoiding Downtime Phone System Router Data Management Money Apple Encryption Gadgets communications Smartphones Remote Monitoring Tech Support USB Users Telephone Systems Humor intranet Firewall Net Neutrality iPhone Collaboration Laptop Recovery Wireless Streaming Media Network Security Automation Education Maintenance User Error Hard Drives Work/Life Balance Disaster Computers Retail Wi-Fi BDR Update Entertainment Flexibility Mobile Office Budget VPN Transportation Shortcut Business Intelligence Internet Exlporer IT Solutions Office 365 Biometrics Social Engineering App Telephony Customer Service Virtual Reality Outlook IT Consultant Fax Server Google Drive Printer Server DDoS Data Loss Personal Information Benefits Marketing Administration Wearable Technology Proactive IT Cybercrime Content Filtering Managed IT Services Risk Management Point of Sale Online Currency PowerPoint Managing Stress Cost Management Private Cloud Wireless Technology Chromecast Customer Relationship Management Legal User SharePoint OneDrive Bring Your Own Device Keyboard Excel Website RAM Administrator Paperless Office Politics Best Available Ebay Reputation Teamwork Workplace Hiring/Firing Blogging CPU Access Miscelllaneous Scalability Presentation Amazon Experience Meetings Hosted Solution Science Slow HIPAA How To Smart Phones Music Phishing End of Support Travel Running Cable Regulations Windows 8 Robot Networking ISP Books 3D Printing Advertising Vendor Management Data storage Human Resources Black Market Near Field Communication Electronic Medical Records PDF Cameras Uninterrupted Power Supply HaaS Computing Data Theft Instant Messaging Safety Computer Accessories Text Messaging Internet of Things Bloatware IT consulting Prodcuctivity Applications CloudSync Battery Distributed Denial of Service Emergency Mouse Artificial Intelligence Online Backup Sports Touchpad Compliance Branding Programming Automobile eWaste Cleaning Network Congestion Worker Commute WIndows 7 Display Operating Sysytem Inbound Marketing Television Audit Save Time Storage Emails Files Two-factor Authentication Video Games Twitter Bluetooth OneNote Trending Hacker

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code