Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

David M. Lay

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why Heart Attack Victims Should Be Wary of Hacking Attacks

Why Heart Attack Victims Should Be Wary of Hacking Attacks

It goes without saying that having to rely on a pacemaker isn’t an ideal circumstance for anyone, even considering that the device allows the patient to continue living a fulfilling life. This is why a particular discovery of a European-based research team becomes a shade or two darker: the team has concluded that it’s possible for a novice to send life-threatening signals to the device.

As a note of the results of their research into implantable cardioverter defibrillators (ICDs) the researchers described the potential dangers of ICD technology.

Pacemakers feature the capability to communicate with external technologies after being activated by a special magnetized device. This capability is generally of benefit to the patient, as their device can be read without an invasive procedure. However, if the patient is out of the doctor’s office within two hours, their pacemaker is still able to receive signals and instructions from any device. This puts the patient themselves at risk of a specialized cyber attack.

This risk can then be exacerbated by the attacker. By sending a signal to the pacemaker device, the device can be kept from returning to “sleep” mode, leaving it vulnerable to more attacks. During their studies, the researchers discovered how wide of a range these attacks could fall under.

Simply by analyzing the signals that the tested devices communicated with their equipment, the team was able to devise a variety of ill-meaning uses for a criminal to take advantage of. Capable of draining the device’s battery or reading the personally identifiable information stored upon it in the patient’s onboard medical records, a cyber criminal could easily make their target’s life miserable. Scarier still, the right message sent to the pacemaker could even turn it off, or activate its heart-shocking features unnecessarily.

The team confirmed that at least 10 varieties of the lifesaving device were vulnerable to the relatively very simple form of attack, without requiring any knowledge of the device itself. Scarier still, they were able to determine why the pacemakers were so vulnerable in the first place.

Putting it very simply, the manufacturers of the devices had relied on the lifesaving pacemakers just not being an obvious target for cyber criminals, and had therefore been satisfied without building a lot of IT security into them. It was this mentality of “nobody will consider this a target” that led to pacemakers becoming a target.
Now, as scary as this story is, this was fortunately conducted by researchers, and not dangerous criminals. Regardless, it’s still pretty unnerving.

So now every business owner should ask: Have I considered that my business might be a target?

Many SMBs hold the same mistaken impression as the pacemaker manufacturers do: there are bigger, more valuable, more obvious targets than my business, so I don’t need to worry about security so much. Unfortunately for these businesses, they are proven wrong so many times.

If you’re unsure of your level of IT security preparedness, give A PC Geek a call at (469) 567-0181. We can help you keep your IT optimally secure, and securely optimized.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 21 March 2019
If you'd like to register, please fill in the username, password and name fields.

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Business Software Business Computing Google Miscellaneous Workplace Tips Windows 10 Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing Communication IT Support User Tips VoIP Business Management Email Holiday Server Network Data Quick Tips Smartphone Virtualization Alert Office Going Green Business Continuity Save Money Mobile Device Management Remote Computing Saving Money Operating System Social Media Upgrade Apps Disaster Recovery Android Small Business Chrome Managed Service Provider Mobility Microsoft Office WiFi Social Identity Theft Application Facebook Antivirus Best Practice Employer-Employee Relationship Ransomware The Internet of Things Big Data Passwords Law Enforcement Saving Time Office Tips Analytics History Search Gmail Password Lithium-ion battery Browser Printer Current Events Government BYOD Information Technology Spam Bandwidth Unified Threat Management Hacking Tablet intranet Gadgets Smartphones Net Neutrality Firewall iPhone Users Collaboration USB Laptop Money Wireless Hard Drives Data Management Maintenance Streaming Media Fraud Education communications User Error Work/Life Balance Computers Disaster Telephone Systems Humor Encryption Avoiding Downtime Phone System Router Recovery Apple Remote Monitoring Network Security Tech Support Automation IT Consultant Fax Server Office 365 Data Loss Private Cloud Managing Stress Wireless Technology Wearable Technology Outlook Printer Server Update Proactive IT Personal Information Marketing Budget Online Currency Administration Shortcut Business Intelligence Transportation Managed IT Services Content Filtering Internet Exlporer Biometrics Point of Sale PowerPoint Social Engineering Cost Management Telephony Customer Service Retail Virtual Reality BDR Wi-Fi Google Drive Entertainment VPN DDoS Flexibility Benefits Mobile Office App Cybercrime Risk Management IT Solutions ISP Television Computing Storage Two-factor Authentication 3D Printing Files Books Bluetooth Trending Black Market Prodcuctivity Customer Relationship Management Chromecast Electronic Medical Records Online Backup Cameras SharePoint HaaS User Instant Messaging Data Theft Excel Administrator Safety Reputation Teamwork Best Available Display Battery CloudSync Presentation Access Emergency Meetings Programming Hosted Solution Automobile Compliance Science Cleaning End of Support Running Cable Phishing Worker Commute Inbound Marketing Save Time Emails Networking Audit Robot RAM Advertising Video Games Website Ebay OneNote Twitter Data storage Hacker Human Resources Near Field Communication CPU PDF Legal Amazon Blogging OneDrive Uninterrupted Power Supply Keyboard Bring Your Own Device Slow Text Messaging Smart Phones Paperless Office Computer Accessories Bloatware Workplace Internet of Things Politics Applications Hiring/Firing IT consulting Artificial Intelligence Distributed Denial of Service Scalability Miscelllaneous Mouse Windows 8 Sports Experience Touchpad Branding eWaste How To HIPAA Network Congestion Vendor Management Travel Music Operating Sysytem Regulations WIndows 7

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code