Vital signs monitor. (Getty Images)
Censys cybersecurity researchers find medical devices, login portals, and health records floating online.
A surgeon implants a pacemaker into a patient in an operating room on July 19, 2013 at the Argenteuil hospital, in a Paris suburb. (FRED DUFOUR / AFP)
A healthcare worker tends to a patient on a ventilator in the Intensive Care Unit of Baptist Health Floyd on September 7, 2021 in New Albany, Indiana. (Photo by Jon Cherry/Getty Images)
Getty Images
Infusion pumps are among the devices affected by the vulnerabilities. (Getty Images)
The Health Information Sharing and Analysis Center (H-ISAC), whose members include big health care providers, has already received threat alerts from the volunteer group. (Getty Images)
By day, they are cybersecurity professionals at well-known companies. By night, they are working to protect health organizations from hackers.
Mar 20, 2020
By
Sean Lyngaas
The set of flaws in a popular wireless protocol known as Bluetooth Low Energy could impact glucose monitors. (Getty Images)
(Getty Images)
The issue involves Conexus, Medtronic’s radio-frequency protocol that’s used for communication between medical technology such as defibrillators, home monitoring devices and other clinician programming tools.
Mar 22, 2019
By
Jeff Stone
(Getty Images)