Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Computer security
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Medical systems=== {{See also|Medical device hijack|Medical data breach}} [[Medical devices]] have either been successfully attacked or had potentially deadly vulnerabilities demonstrated, including both in-hospital diagnostic equipment<ref>{{cite web|url=http://www.darkreading.com/vulnerabilities---threats/hospital-medical-devices-used-as-weapons-in-cyberattacks/d/d-id/1320751|title=Hospital Medical Devices Used As Weapons in Cyberattacks|work=Dark Reading|date=6 August 2015|access-date=23 May 2016|url-status=live|archive-url=https://web.archive.org/web/20160529002947/http://www.darkreading.com/vulnerabilities---threats/hospital-medical-devices-used-as-weapons-in-cyberattacks/d/d-id/1320751|archive-date=29 May 2016}}</ref> and implanted devices including [[pacemaker]]s<ref>{{cite web|url=http://www.computerworld.com/article/2492453/malware-vulnerabilities/pacemaker-hack-can-deliver-deadly-830-volt-jolt.html|title=Pacemaker hack can deliver deadly 830-volt jolt|first=Jeremy|last=Kirk|date=17 October 2012|work=Computerworld|access-date=23 May 2016|url-status=live|archive-url=https://web.archive.org/web/20160604201841/http://www.computerworld.com/article/2492453/malware-vulnerabilities/pacemaker-hack-can-deliver-deadly-830-volt-jolt.html|archive-date=4 June 2016}}</ref> and [[insulin pump]]s.<ref>{{cite news|url=http://www.thedailybeast.com/articles/2014/11/17/how-your-pacemaker-will-get-hacked.html|title=How Your Pacemaker Will Get Hacked|newspaper=The Daily Beast|access-date=23 May 2016|url-status=live|archive-url=https://web.archive.org/web/20160520155616/http://www.thedailybeast.com/articles/2014/11/17/how-your-pacemaker-will-get-hacked.html|archive-date=20 May 2016|date=17 November 2014|agency=Kaiser Health News}}</ref> There are many reports of hospitals and hospital organizations getting hacked, including [[ransomware]] attacks,<ref>{{cite magazine|last1=Leetaru|first1=Kalev|title=Hacking Hospitals And Holding Hostages: Cybersecurity In 2016|url=https://www.forbes.com/sites/kalevleetaru/2016/03/29/hacking-hospitals-and-holding-hostages-cybersecurity-in-2016/|magazine=Forbes|access-date=29 December 2016|url-status=live|archive-url=https://web.archive.org/web/20161229104021/http://www.forbes.com/sites/kalevleetaru/2016/03/29/hacking-hospitals-and-holding-hostages-cybersecurity-in-2016/|archive-date=29 December 2016}}</ref><ref name="wiwo1">{{cite web|title=Cyber-Angriffe: Krankenhäuser rücken ins Visier der Hacker|date=7 December 2016 |url=http://www.wiwo.de/technologie/digitale-welt/cyber-angriffe-krankenhaeuser-ruecken-ins-visier-der-hacker/14946040.html|publisher=Wirtschafts Woche|access-date=29 December 2016|url-status=live|archive-url=https://web.archive.org/web/20161229101724/http://www.wiwo.de/technologie/digitale-welt/cyber-angriffe-krankenhaeuser-ruecken-ins-visier-der-hacker/14946040.html|archive-date=29 December 2016}}</ref><ref>{{cite web|title=Hospitals keep getting attacked by ransomware{{snd}}Here's why|url=http://www.businessinsider.com/hospital-ransomware-hack-2016-5|website=Business Insider|access-date=29 December 2016|url-status=live|archive-url=https://web.archive.org/web/20161229101247/http://www.businessinsider.com/hospital-ransomware-hack-2016-5|archive-date=29 December 2016}}</ref><ref>{{cite web|title=MedStar Hospitals Recovering After 'Ransomware' Hack|url=https://www.nbcnews.com/news/us-news/medstar-hospitals-recovering-after-ransomware-hack-n548121|work=NBC News|date=31 March 2016 |access-date=29 December 2016|url-status=live|archive-url=https://web.archive.org/web/20161229103355/https://www.nbcnews.com/news/us-news/medstar-hospitals-recovering-after-ransomware-hack-n548121|archive-date=29 December 2016}}</ref> [[Windows XP]] exploits,<ref>{{cite web|last1=Pauli|first1=Darren|title=US hospitals hacked with ancient exploits|url=https://www.theregister.co.uk/2016/06/28/medjack/|website=The Register|access-date=29 December 2016|url-status=live|archive-url=https://web.archive.org/web/20161116141207/http://www.theregister.co.uk/2016/06/28/medjack|archive-date=16 November 2016}}</ref><ref>{{cite web|last1=Pauli|first1=Darren|title=Zombie OS lurches through Royal Melbourne Hospital spreading virus|url=https://www.theregister.co.uk/2016/01/19/melbourne_hospital_pathology_wing_splattered_by_virus/|website=The Register|access-date=29 December 2016|url-status=live|archive-url=https://web.archive.org/web/20161229101019/http://www.theregister.co.uk/2016/01/19/melbourne_hospital_pathology_wing_splattered_by_virus/|archive-date=29 December 2016}}</ref> viruses,<ref>{{cite news|title=Hacked Lincolnshire hospital computer systems 'back up'|url=https://www.bbc.com/news/uk-england-humber-37849746|work=BBC News|access-date=29 December 2016|date=2 November 2016|url-status=live|archive-url=https://web.archive.org/web/20161229101819/http://www.bbc.com/news/uk-england-humber-37849746|archive-date=29 December 2016}}</ref><ref>{{cite news|title=Lincolnshire operations cancelled after network attack|url=https://www.bbc.com/news/uk-england-humber-37822084|work=BBC News|access-date=29 December 2016|date=31 October 2016|url-status=live|archive-url=https://web.archive.org/web/20161229101209/http://www.bbc.com/news/uk-england-humber-37822084|archive-date=29 December 2016}}</ref> and data breaches of sensitive data stored on hospital servers.<ref>{{cite news|title=Legion cyber-attack: Next dump is sansad.nic.in, say hackers|url=http://indianexpress.com/article/technology/tech-news-technology/legion-hacking-no-political-agenda-just-computer-geeks-says-hacker-4423167/|newspaper=The Indian Express|access-date=29 December 2016|date=12 December 2016|url-status=live|archive-url=https://web.archive.org/web/20161229100631/http://indianexpress.com/article/technology/tech-news-technology/legion-hacking-no-political-agenda-just-computer-geeks-says-hacker-4423167/|archive-date=29 December 2016}}</ref><ref name="wiwo1" /><ref>{{cite web|title=Former New Hampshire Psychiatric Hospital Patient Accused Of Data Breach|url=http://boston.cbslocal.com/2016/12/27/former-patient-accused-data-breech-new-hampshire-psychiatric-hospital/|publisher=CBS Boston|access-date=29 December 2016|url-status=live|archive-url=https://web.archive.org/web/20170929233237/http://boston.cbslocal.com/2016/12/27/former-patient-accused-data-breech-new-hampshire-psychiatric-hospital/|archive-date=29 September 2017|date=27 December 2016}}</ref><ref>{{cite web|title=Texas Hospital hacked, affects nearly 30,000 patient records|url=http://www.healthcareitnews.com/news/texas-hospital-hacked-affects-nearly-30000-patient-records|publisher=Healthcare IT News|access-date=29 December 2016|date=4 November 2016|url-status=live|archive-url=https://web.archive.org/web/20161229171117/http://www.healthcareitnews.com/news/texas-hospital-hacked-affects-nearly-30000-patient-records|archive-date=29 December 2016}}</ref> On 28 December 2016 the US [[Food and Drug Administration]] released its recommendations for how medical [[Medical device manufacturing|device manufacturers]] should maintain the security of Internet-connected devices – but no structure for enforcement.<ref>{{cite web|last1=Becker|first1=Rachel|title=New cybersecurity guidelines for medical devices tackle evolving threats|url=https://www.theverge.com/2016/12/27/14095166/fda-guidance-medical-device-cybersecurity-cyberattack-hacking-guidelines|website=The Verge|access-date=29 December 2016|date=27 December 2016|url-status=live|archive-url=https://web.archive.org/web/20161228210257/http://www.theverge.com/2016/12/27/14095166/fda-guidance-medical-device-cybersecurity-cyberattack-hacking-guidelines|archive-date=28 December 2016}}</ref><ref>{{cite web|title=Postmarket Management of Cybersecurity in Medical Devices|website=[[Food and Drug Administration]]|url=https://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM482022.pdf|access-date=29 December 2016|date=28 December 2016|url-status=dead|archive-url=https://web.archive.org/web/20161229102808/https://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM482022.pdf|archive-date=29 December 2016}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)