Reverse engineering included deconstructing the medical gadget to locate possible weak areas, such as inadequate radio-frequency transmitters or exposed USB ports. “Youve simply got to believe and sit like a bad person for a little while to think about all the methods to attack that system,” Dr. Nowatkowski told the publication.
© Copyright ASC COMMUNICATIONS 2020. Interested in LINKING to or REPRINTING this content? View our policies by click on this link.
Many cybercriminals are finding ways to take advantage of poor medical gadget cybersecurity by purchasing medical equipment from sites like eBay to look for weaknesses and sometimes access patient information that wasnt effectively gotten rid of from the device, he said.
More articles on cybersecurity: U of Missouri Health Care e-mail hack exposes details of 5,000 patients: 4 details66% of healthcare data breaches caused by hackers, HHS information showsRansomware attack encrypts 30 servers at German health center: 5 details.
Jackie Drees –
Monday, September 21st, 2020
Michael Nowatkowski, PhD, associate teacher at University of Augustas computer and cyber sciences school in Georgia, specializes in reverse engineering medical gadgets to inspect their cybersecurity strength, according to a Sept. 18 Athens Banner-Herald report..
Medical facilities now can have up to a lots internet-connected devices per client bed, which help gather and stream patient data to caretakers. These devices also double as possible entry points for hackers to get into the hospitals bigger network and take information consisting of client medical records or cause a ransomware attack.
By reverse engineering medical devices, Dr. Nowatkowski stated he hopes “whatever we can improve likewise can be utilized in any other embedded system or any other internet-of-things device,” and added that he believes scientists in the future will produce field-testing improvements in healthcare devices at virtual facilities..