Understanding and Exploiting Implanted Medical Devices
This presentation is the culmination of an 18-month independent case study in implanted medical devices. The presenters will provide detailed technical findings on remote exploitation of a pacemaker systems, pacemaker infrastructure, and a neurostimulator system. Exploitation of these vulnerabilities allow for the disruption of therapy as well as the ability to execute shocks to a patient.
By Billy Rios + Jonathan Butts
Full abstract: www.blackhat.com/us-18/briefi...
Пікірлер: 5
FCC with the FDA should regulate the standards for medical devices like this. Shame on the manufacturer for not taking the steps necessary to protect the livelihood of their users. Insurance companies stop paying once their patients die.
I have some experience with smart utility meters and these medical device manufacturers should take note of how smart meters work. You can send an attention signal to a smart meter that contains the serial number in plain text but beyond that, all radio traffic is encrypted. Each device has a unique key assigned at the time it is programmed for the customer. All this is just to prevent hackers from cheating on their electric bills.
how come medical hackers never asked me
Its sick bc the ppl harrassing come from jealousy and desperate emotional places . Almost every word i speak they reply and are listening and sending vibration to stay on my brain. Its sick . Like ugh God deliverance i pray . They are thinking to get money bc of county debt and im thinking my purpose . They steal and are doing some crazy things . Earth ya know .