Blog Layout

These Medical Devices Are Vulnerable To Security Threats

sccomputerguys • Mar 19, 2022

Thanks to the fine folks at Palo Alto Networks we have a better view of the relative safety and security of network-capable medical devices.  Unfortunately, the news is grim.

Based on their findings after examining more than 200,000 infusion pumps, about half are vulnerable to critical security issues.

Yes you read that correctly. That's 100,000 infusion pumps that are critically vulnerable to hacking attacks. To put it another way, that's 100,000 chances every single day that someone is going to initiate a hacking attack that will actually kill someone.

What's worse is that of the eleven security vulnerabilities identified by their research, no one is making it a priority to fix the issues. Even if they did try to fix it, it's anyone's guess how quickly those devices would be updated or if they would be updated at all.

This is not unique to the world of "smart" medical devices either.  In fact, as the Internet of Things (IoT) grows, one of the biggest security challenges we face will be how to better secure those legions of "smart" devices. That is because most product manufacturers send them out the door with little to no protection, and often in the cases of devices with protection it's so marginal as to be practically nonexistent.

Of course, part of the problem lies in the fact that product manufacturers aren't on the hook if a product they sell without security or with fatally flawed security gets hacked.  That will likely change but it hasn't so far. So there's very little incentive for manufacturers to improve.

In any case, if you or someone you know uses a "smart" infusion pump be aware that based on Palo Alto's research more than half of them (52 percent) are incredibly easy for hackers to take control of and that's terrifying.

By sccomputerguys 22 Jul, 2022
Do you own one or more of the following products made by Cisco? The RV110W Wireless-N VPN Firewall The RV130 VPN Router The RV130W Wireless-N Multifunction VPN Router The RV215W Wireless-N VPN ...
By sccomputerguys 21 Jul, 2022
Do you use Microsoft Teams?  If so, you'll be thrilled to know that the Redmond Giant is continuing to pour resources into improving the software with a specific focus on audio and ...
By sccomputerguys 20 Jul, 2022
Corporate branding can be worth its weight in gold and certain images are absolutely iconic.  The Golden Arches, the Nike "swoosh," and Apple's Apple all come to mind. Logo images give companies ...
By sccomputerguys 19 Jul, 2022
Remember the Heartbleed scare we had a couple years back?  It was a nasty side-channel attack that was somewhat exotic and difficult to pull off, and it was absolutely devastating and sent ...
By sccomputerguys 18 Jul, 2022
Microsoft Exchange servers are once more in the crosshairs of hackers around the world.  Most recently, hacking groups have been specifically targeting them to deploy BlackCat ransomware. As is common among ransomware ...
By sccomputerguys 16 Jul, 2022
If you grew up in the days before the internet, it's absolutely staggering to think of all the ways that mobile technology has changed our lives (and mostly for the better). Remember ...
By sccomputerguys 15 Jul, 2022
It may seem as though Internet Explorer is the browser that will not die, but according to Microsoft, it is now a step closer to breathing its last virtual breath. Microsoft has ...
By sccomputerguys 14 Jul, 2022
If you're involved with IT Security at any level and if your network includes Linux servers, keep a watchful eye out for the new Panchan botnet. It first appeared in the wilds ...
By sccomputerguys 13 Jul, 2022
These days, companies spend significant sums of money to protect themselves from cyber criminals.  The threat matrix is vast, and attacks can come from almost any quarter. That is why many companies ...
By sccomputerguys 12 Jul, 2022
Do you receive healthcare of any kind from Kaiser Permanente?  If so, be aware that they recently published a data breach notification indicating that an unidentified attacker accessed an email account that ...
More Posts
Share by: