Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

David M. Lay

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why Heart Attack Victims Should Be Wary of Hacking Attacks

Why Heart Attack Victims Should Be Wary of Hacking Attacks

It goes without saying that having to rely on a pacemaker isn’t an ideal circumstance for anyone, even considering that the device allows the patient to continue living a fulfilling life. This is why a particular discovery of a European-based research team becomes a shade or two darker: the team has concluded that it’s possible for a novice to send life-threatening signals to the device.

As a note of the results of their research into implantable cardioverter defibrillators (ICDs) the researchers described the potential dangers of ICD technology.

Pacemakers feature the capability to communicate with external technologies after being activated by a special magnetized device. This capability is generally of benefit to the patient, as their device can be read without an invasive procedure. However, if the patient is out of the doctor’s office within two hours, their pacemaker is still able to receive signals and instructions from any device. This puts the patient themselves at risk of a specialized cyber attack.

This risk can then be exacerbated by the attacker. By sending a signal to the pacemaker device, the device can be kept from returning to “sleep” mode, leaving it vulnerable to more attacks. During their studies, the researchers discovered how wide of a range these attacks could fall under.

Simply by analyzing the signals that the tested devices communicated with their equipment, the team was able to devise a variety of ill-meaning uses for a criminal to take advantage of. Capable of draining the device’s battery or reading the personally identifiable information stored upon it in the patient’s onboard medical records, a cyber criminal could easily make their target’s life miserable. Scarier still, the right message sent to the pacemaker could even turn it off, or activate its heart-shocking features unnecessarily.

The team confirmed that at least 10 varieties of the lifesaving device were vulnerable to the relatively very simple form of attack, without requiring any knowledge of the device itself. Scarier still, they were able to determine why the pacemakers were so vulnerable in the first place.

Putting it very simply, the manufacturers of the devices had relied on the lifesaving pacemakers just not being an obvious target for cyber criminals, and had therefore been satisfied without building a lot of IT security into them. It was this mentality of “nobody will consider this a target” that led to pacemakers becoming a target.
Now, as scary as this story is, this was fortunately conducted by researchers, and not dangerous criminals. Regardless, it’s still pretty unnerving.

So now every business owner should ask: Have I considered that my business might be a target?

Many SMBs hold the same mistaken impression as the pacemaker manufacturers do: there are bigger, more valuable, more obvious targets than my business, so I don’t need to worry about security so much. Unfortunately for these businesses, they are proven wrong so many times.

If you’re unsure of your level of IT security preparedness, give A PC Geek a call at (469) 567-0181. We can help you keep your IT optimally secure, and securely optimized.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 21 January 2019
If you'd like to register, please fill in the username, password and name fields.

Sign Up for Our Newsletter

Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Software Business Computing Google Business Miscellaneous Workplace Tips Windows 10 Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Devices Mobile Computing IT Services Health User Tips Communication IT Support VoIP Business Management Data Quick Tips Email Holiday Virtualization Server Network Smartphone Upgrade Saving Money Office Disaster Recovery Apps Alert Save Money Remote Computing Going Green Operating System Business Continuity Social Media Mobile Device Management Small Business Android Chrome Big Data Managed Service Provider Microsoft Office Mobility Application Social Facebook Best Practice WiFi Identity Theft Employer-Employee Relationship Ransomware Antivirus The Internet of Things Passwords Law Enforcement Office Tips Password History Analytics Search Gmail Browser Current Events Government Saving Time Lithium-ion battery Printer Information Technology Spam Bandwidth Unified Threat Management BYOD Hacking Tablet Encryption Gadgets Smartphones Remote Monitoring Users USB Tech Support Data Management Money intranet Firewall Net Neutrality iPhone Wireless Collaboration Laptop Streaming Media Education communications User Error Work/Life Balance Telephone Systems Hard Drives Disaster Maintenance Computers Humor Fraud Avoiding Downtime Recovery Phone System Router Network Security Apple Automation VPN IT Solutions Managing Stress Private Cloud Office 365 Wireless Technology App Update Outlook Printer Server IT Consultant Personal Information Budget Fax Server Data Loss Marketing Administration Transportation Shortcut Business Intelligence Wearable Technology Internet Exlporer Content Filtering Managed IT Services Biometrics Social Engineering Proactive IT Telephony Point of Sale Customer Service PowerPoint Cost Management Online Currency Virtual Reality Retail Google Drive BDR Wi-Fi DDoS Entertainment Flexibility Benefits Mobile Office Cybercrime Risk Management Television Storage Travel Music Smart Phones Files Two-factor Authentication Slow Regulations ISP Bluetooth Trending 3D Printing Books Chromecast Windows 8 Customer Relationship Management User Black Market SharePoint Electronic Medical Records Excel Administrator Vendor Management HaaS Cameras Best Available Data Theft Reputation Instant Messaging Teamwork Safety Computing Access Presentation CloudSync Battery Meetings Emergency Hosted Solution Science Prodcuctivity Phishing Compliance End of Support Programming Automobile Running Cable Cleaning Online Backup Robot Networking Inbound Marketing Advertising Worker Commute Audit Save Time Emails Data storage Display Video Games Human Resources Near Field Communication Twitter PDF OneNote Hacker Uninterrupted Power Supply Legal Computer Accessories Text Messaging OneDrive Bring Your Own Device Keyboard Internet of Things Bloatware Paperless Office Applications IT consulting Distributed Denial of Service Mouse Artificial Intelligence Workplace Politics Hiring/Firing Sports Website RAM Miscelllaneous Touchpad Ebay Scalability Branding eWaste Network Congestion Experience Amazon Blogging CPU WIndows 7 HIPAA Operating Sysytem How To

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...