Network Security for Medical Devices

Medical devices perform critical functions in surgery, hospital care, and clinical settings, and play an increasing role in home health care.  Millions of people rely on medical devices to stay alive and depend upon them to improve the quality of their life.

Unquestionably, medical devices provide tremendous benefit to society, but few people think about the associated safety and security issues.  Medical devices rely on network connectivity to provide remote reporting, diagnostics, and control opening them up to a new breed of attacks.

CIA Exploits IoT Devices...What Lessons Can We Learn?

Recent WikiLeaks documents allege that the CIA developed, or sought to develop, or even “borrowed,” cyberattack technology that could target a wide range of IoT devices, including smart TVs, connected cars, and mobile phones.  In the case of smart TVs and mobile phones, the attacks allowed these devices to be used to eavesdrop on either voice communication, data communication, or both. 

Hacked Doorbells Open The Gate for Thieves and Criminals

“IoT doorbell gave up Wi-Fi passwords to anybody with a screwdriver” read the headline from the January 27, 2016 posting on Naked Security by Sophos.  Many people will look at that and question the reliability of the article, wondering how it’s possible that something as simple as a doorbell could lead to such an invasion of privacy.  There’s an assumption of safety that comes with technological devices that creates a sense of false security for most consumers. 

Consumer Electronics Show – the largest collection of insecure devices in the world

The annual Consumer Electronics Show in Las Vegas has just wrapped up.  With 160,000 attendees, 3,800 exhibitors and almost 2.5 million square feet of exhibit space, this is the largest electronics show in the world.  The array of new products and technologies has been featured on virtually every media outlet from Good Morning America to Conan. 

Roll your own vs. commercial, the great RTOS Security Framework Debate?

Security solutions for embedded devices are where RTOSes were in the 1980s.  A few commercial solutions have started to appear on the market and customers are left with the choice of rolling their own solution or adopting a commercial solution. 

Early on, many companies rolled their own RTOS.  Over time, this gradually changed with commercial RTOSes becoming a larger and larger percentage of the market.  Eventually, quality open-source solutions became available, providing yet another option for developers.

Security for the Smart Home – Who is Responsible?

As smart home technology moves from the lab to the marketplace, many home security, surveillance and control functions will now be exposed to the Internet through Smart Home gateways and management systems.  Are these systems ready for the cyber-attacks that will undoubtedly ensue?  And who is responsible for ensuring these devices are safe from attack?

The security challenge for the smart home, with its network of specialized, connected devices is different than the security challenges for enterprise networks and PC systems.

Pages