Insulin pump hack delivers fatal dosage over the air
Medtronic ignore original attempts to fix this problem back in August. As a wireless engineer focusing in the Healthcare vertical its always important to test all your medical devices prior to deployment. A simple port scan could yield valuable information and potential means to access these devices. Often times, vendors will leave default logon credentials allowing access.
The attack on wireless insulin pumps made by medical devices giant Medtronic was demonstrated Tuesday at the Hacker Halted conference in Miami. It was delivered by McAfee's Barnaby Jack, the same researcher who last year showed how to take control of two widely used models of automatic teller machines so he could to cause them to spit out a steady stream of dollar bills.
Read more:
http://www.theregister.co.uk/2011/10/27/fatal_insulin_pump_attack/
Reader Comments (1)
George,
I'm with you on this one, brother. This NEEDS attention. As the recipient of a neuromodulation device that works on, of all frequencies, 125khz, I'm waiting for someone (else) to see how lame the security is and drop my legs out from under me. When is HIPPA Hi-Tech going to realize that ANY wireless emission is suspect and needs to be treated with the HIGHEST possible security measures? Especially when it is mounted on or in a human?
Medtronic has had a blind eye to security since the early 900Mhz to GSM/SMS interrogated heart monitoring devices. It was pointed out to them repeatedly.