DOTmed Home MRI Oncology Ultrasound Molecular Imaging X-Ray Cardiology Health IT Business Affairs
News Home Parts & Service Operating Room CT Women's Health Proton Therapy Endoscopy HTMs Mobile Imaging
SEARCH
Current Location:
>
> This Story

starstarstarstarstar (1)
Log in or Register to rate this News Story
Forward Printable StoryPrint Comment

 

More Industry Headlines

The continuing evolution of digital radiography From an amenity to the industry standard

RSNA Product Showcase Some of the latest technology being showcased on the exhibit floor

The first (and only) female Medal of Honor winner How a doctor turned Civil War spy left her mark in history

Shanghai Pharma to acquire Cardinal Health China business for $1.2 billion Deal includes pharma and medical products distribution business

Carestream Health now shipping MyVue Center Self-Service Kiosk Provides patients with access to imaging exam records quicker

ARUP and ASI launch PathFusion pathology imaging suite Result of multi-year collaboration

Digital health intelligence finds the patient Innovation across the globe becomes increasingly mobile, digital, personal and accessible

Elekta to add functional imaging capabilities and take more time to validate MR-linac system Expects CE approval in first half of 2018

Sectra partners with Telemedicine Clinic to support orthopedic customers Offers teleradiology services for assessing loose implants

MEVION S250i Proton Therapy System scores CE mark First European installation to be in Netherlands

Suzanne Schwartz, FDA

Yes, Cheney's pacemaker cyber attack fears were credible

by Carol Ko , Staff Writer
Former vice president Dick Cheney made headlines this week after admitting in a 60 Minutes interview that he disabled his pacemaker's Wi-Fi in 2007 to thwart terrorists who might try to hack into it and kill him.

Though this scenario sounds like something out of a science fiction movie (an episode of the Showtime series "Homeland" featured a similar plot line), it turns out these fears aren't unfounded.

Story Continues Below Advertisement

Streamline Your Radiology Workflow with RamSoft's PowerServer RIS/PACS

The PowerServer RIS/PACS is a single database application, essential to reducing redundant work, limiting manual data entry, and increasing consistency throughout healthcare practices. Click to learn how it will help you improve patient care and more.



In 2008, computer scientist Kevin Fu, now at the University of Michigan, demonstrated in a research lab that he could hack into a combination heart defibrillator and pacemaker to induce potentially fatal electric jolts.

Last year, researchers at computer security firm McAffee claimed they'd found a way to hack into an insulin pump to make it release 45 days worth of insulin in one go.

And finally, security analysts Terry McCorkle and Billy Rios of Cylance discovered a hard-coded password vulnerability affecting over 300 devices across 40 vendors that could be exploited to change critical settings or modify the device. They alerted the U.S. Food and Drug Administration to their findings.

Devices affected included ventilators, drug infusion pumps, external defibrillators, patient monitors, and laboratory and analysis equipment.

The agency took action by communicating with the vendors identified in the study and holding a stakeholder call in which their anonymity amongst each other was maintained.

However, it took some heat when it rebuffed hospital security officers' requests to access the list of implicated devices. "We were not going to give out that information publicly," said Suzanne Schwartz, director of emergency preparedness/operations & medical countermeasures at the CDRH/FDA, in a web conference call hosted by ECRI Institute.

Schwartz explained that if Rios and McCorkle had wanted to invest more effort, they could have identified thousands of more devices with similar vulnerabilities.

"The lesson is not to point fingers at one particular manufacturer or system but rather to view this as a call to action to keep our shops in order," she said.

Blame game

Of course, part of the problem with medical cybersecurity is that there's no single entity in charge of keeping those shops in order, so to speak.

In the past, hospitals and manufacturers have pointed fingers at each other for hampering cybersecurity efforts. Manufacturers claim that hospitals don't want to pay for it, while hospitals claim manufacturers don't provide devices they can secure.
  Pages: 1 - 2 - 3 >>

Related:


You Must Be Logged In To Post A Comment

Advertise
Increase Your
Brand Awareness
Auctions + Private Sales
Get The
Best Price
Buy Equipment/Parts
Find The
Lowest Price
Daily News
Read The
Latest News
Directory
Browse All
DOTmed Users
Ethics on DOTmed
View Our
Ethics Program
Gold Parts Vendor Program
Receive PH
Requests
Gold Service Dealer Program
Receive RFP/PS
Requests
Healthcare Providers
See all
HCP Tools
Jobs/Training
Find/Fill
A Job
Parts Hunter +EasyPay
Get Parts
Quotes
Recently Certified
View Recently
Certified Users
Recently Rated
View Recently
Certified Users
Rental Central
Rent Equipment
For Less
Sell Equipment/Parts
Get The
Most Money
Service Technicians Forum
Find Help
And Advice
Simple RFP
Get Equipment
Quotes
Virtual Trade Show
Find Service
For Equipment
Access and use of this site is subject to the terms and conditions of our LEGAL NOTICE & PRIVACY NOTICE
Property of and Proprietary to DOTmed.com, Inc. Copyright ©2001-2017 DOTmed.com, Inc.
ALL RIGHTS RESERVED