SEARCH
Current Location:
>
> This Story

starstarstarstarstar (1)
Log in or Register to rate this News Story
Forward Printable StoryPrint Comment

Never Miss a Story

Sign up for email alerts

 

More Industry Headlines

GE Healthcare to relocate global headquarters from UK to Chicago Milwaukee to remain hub for imaging business and global manufacturing

Philips enters into $90 million, 15-year partnership with Marin General Hospital The third partnership of its kind for Philips in six months

New online tool may predict the risk of kidney failure in kidney disease patients Includes data from 721,000 patients from 30 countries

Chinese hospital demolished with patients, doctors still inside Equipment damaged, doctors scuffled with wrecking crew

DNA sequencing company Illumina forms GRAIL to develop cancer detection blood test Hopes to market tests for under $1,000 each

Here are 10 Joint Commission citations imaging staff should watch out for in 2016

Eliminating additional imaging from lung cancer therapy With 4-D CT, Colorado Cancer Center is saving money and improving outcomes

Henry Ford to begin using 'game-changing' robotic brain surgery system With BrightMatter, 20-30 inoperable cases may become treatable

Hospira scores CE mark for Nuitiv, needle-free IV connector A catheter-related bloodstream infection can cost $56,000 to treat

Using functional MR to beat the 'genetic lottery' for bipolar disorder Biological mechanisms to protect against mental illness

Suzanne Schwartz, FDA

Yes, Cheney's pacemaker cyber attack fears were credible

by Carol Ko , Staff Writer
Former vice president Dick Cheney made headlines this week after admitting in a 60 Minutes interview that he disabled his pacemaker's Wi-Fi in 2007 to thwart terrorists who might try to hack into it and kill him.

Though this scenario sounds like something out of a science fiction movie (an episode of the Showtime series "Homeland" featured a similar plot line), it turns out these fears aren't unfounded.

Story Continues Below Advertisement

Workflow intelligence optimizes priority of reads

It only takes one delayed reading with a bad outcome to lead to a disaster. Click to read about a workflow intelligence system that makes sure the most urgent cases get read first and on time.



In 2008, computer scientist Kevin Fu, now at the University of Michigan, demonstrated in a research lab that he could hack into a combination heart defibrillator and pacemaker to induce potentially fatal electric jolts.

Last year, researchers at computer security firm McAffee claimed they'd found a way to hack into an insulin pump to make it release 45 days worth of insulin in one go.

And finally, security analysts Terry McCorkle and Billy Rios of Cylance discovered a hard-coded password vulnerability affecting over 300 devices across 40 vendors that could be exploited to change critical settings or modify the device. They alerted the U.S. Food and Drug Administration to their findings.

Devices affected included ventilators, drug infusion pumps, external defibrillators, patient monitors, and laboratory and analysis equipment.

The agency took action by communicating with the vendors identified in the study and holding a stakeholder call in which their anonymity amongst each other was maintained.

However, it took some heat when it rebuffed hospital security officers' requests to access the list of implicated devices. "We were not going to give out that information publicly," said Suzanne Schwartz, director of emergency preparedness/operations & medical countermeasures at the CDRH/FDA, in a web conference call hosted by ECRI Institute.

Schwartz explained that if Rios and McCorkle had wanted to invest more effort, they could have identified thousands of more devices with similar vulnerabilities.

"The lesson is not to point fingers at one particular manufacturer or system but rather to view this as a call to action to keep our shops in order," she said.

Blame game

Of course, part of the problem with medical cybersecurity is that there's no single entity in charge of keeping those shops in order, so to speak.

In the past, hospitals and manufacturers have pointed fingers at each other for hampering cybersecurity efforts. Manufacturers claim that hospitals don't want to pay for it, while hospitals claim manufacturers don't provide devices they can secure.

Continue reading Yes, Cheney's pacemaker cyber attack fears were credible...
  Pages: 1 - 2 - 3 >>

Related:


Interested in Medical Industry News? Subscribe to DOTmed's weekly news email and always be informed. Click here, it takes just 30 seconds.

You Must Be Logged In To Post A Comment

Advertise
Increase Your
Brand Awareness
Auctions + Private Sales
Get The
Best Price
Buy Equipment/Parts
Find The
Lowest Price
Daily News
Read The
Latest News
Directory
Browse All
DOTmed Users
Ethics on DOTmed
View Our
Ethics Program
Gold Parts Vendor Program
Receive PH
Requests
Gold Service Dealer Program
Receive RFP/PS
Requests
Healthcare Providers
See all
HCP Tools
Jobs/Training
Find/Fill
A Job
Parts Hunter +EasyPay
Get Parts
Quotes
Recently Certified
View Recently
Certified Users
Recently Rated
View Recently
Certified Users
Rental Central
Rent Equipment
For Less
Sell Equipment/Parts
Get The
Most Money
Service Technicians Forum
Find Help
And Advice
Simple RFP
Get Equipment
Quotes
Virtual Trade Show
Find Service
For Equipment
Access and use of this site is subject to the terms and conditions of our LEGAL NOTICE & PRIVACY NOTICE
Property of and Proprietary to DOTmed.com, Inc. Copyright ©2001-2016 DOTmed.com, Inc.
ALL RIGHTS RESERVED