tag:blogger.com,1999:blog-1944904461287889974.post6303110431306631055..comments2023-10-21T03:49:13.649-07:00Comments on Medical Monitoring & Remote Programming: How to Hack Grandpa's ICDUnknownnoreply@blogger.comBlogger3125tag:blogger.com,1999:blog-1944904461287889974.post-27259120612636439452017-08-29T23:48:30.378-07:002017-08-29T23:48:30.378-07:00Great blog all the bestGreat blog all the bestUrology Surgery Indiahttp://www.urocareindia.com/noreply@blogger.comtag:blogger.com,1999:blog-1944904461287889974.post-46204823638035529202010-04-09T17:58:33.439-07:002010-04-09T17:58:33.439-07:00It is interesting to consider the reaction the Hea...It is interesting to consider the reaction the Heart Rhythm Society had to this article. Their statement on this publication indicated:<br />“Although the experiment by Dr. Maisel and colleagues is a technical study that may be of interest to<br />engineers who design wireless transmission systems, the results do not have any important<br />implications for patients and there is no reason for alarm,” said Dr. Bruce Lindsay, President of<br />the Heart Rhythm Society.<br />“This is not a product failure or safety recall. Millions of patients worldwide have benefited from the use<br />of ICDs and this technology will continue to be critical in the treatment of patients who are at risk for<br />life threatening heart rhythm disorders.”<br /><br />Frankly, a hack done from a maximum distance of 5 cm, when you had a MDT programmer in your possesion to allow you to reverse engineer the link, probably is not going to impress too many people as a major security flaw.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-1944904461287889974.post-7027599633700135542010-04-08T20:58:05.883-07:002010-04-08T20:58:05.883-07:00I am a bit surprised that no one has commented on ...I am a bit surprised that no one has commented on this post. I found it disturbing that a wireless ICD or pacemaker could be hacked. Maybe I'm more sensitive to the issues because ... interesting enough ... I'm a founder of a data & voice communications security company. Thus, I have a pretty good sense that the authors of the article have a pretty good handle on the potential security problems with wireless devices, especially if they can be reprogrammed using wireless.<br /><br />Comments?RemoteProgrammerGuruhttps://www.blogger.com/profile/05304627400232933806noreply@blogger.com