<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber security flaws can kill</title>
	<atom:link href="http://www.epanorama.net/blog/2014/10/28/cyber-security-flaws-can-kill/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2014/10/28/cyber-security-flaws-can-kill/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Wed, 22 Apr 2026 08:40:06 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Joseph</title>
		<link>https://www.epanorama.net/blog/2014/10/28/cyber-security-flaws-can-kill/comment-page-1/#comment-1426664</link>
		<dc:creator><![CDATA[Joseph]]></dc:creator>
		<pubDate>Mon, 17 Aug 2015 02:09:54 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=28047#comment-1426664</guid>
		<description><![CDATA[I like the you think. Great  article as usual. Now a days cyber security is most important. Cause lot&#039;s of offenses there using cyber. So need to take proper step about cyber security.]]></description>
		<content:encoded><![CDATA[<p>I like the you think. Great  article as usual. Now a days cyber security is most important. Cause lot&#8217;s of offenses there using cyber. So need to take proper step about cyber security.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/10/28/cyber-security-flaws-can-kill/comment-page-1/#comment-1340930</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 11 Feb 2015 13:29:09 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=28047#comment-1340930</guid>
		<description><![CDATA[Could a wireless pacemaker let hackers take control of your heart?
http://news.sciencemag.org/health/2015/02/could-wireless-pacemaker-let-hackers-take-control-your-heart

In a 2012 episode of the TV series Homeland, Vice President William Walden is assassinated by a terrorist who hacks into his Internet-enabled heart pacemaker and accelerates his heartbeat until he has a heart attack. A flight of fancy? Not everyone thinks so.

Internet security experts have been warning for years that such devices are open to both data theft and remote control by a hacker. In 2007, Vice President Dick Cheney&#039;s cardiologist disabled the wireless functionality of his pacemaker because of just that risk. “It seemed to me to be a bad idea for the vice president to have a device that maybe somebody on a rope line or in the next hotel room or downstairs might be able to get into—hack into,” said the cardiologist, Jonathan Reiner of George Washington University Hospital in Washington, D.C., in a TV interview last year.

Medical devices such as insulin pumps, continuous glucose monitors, and pacemakers or defibrillators have become increasingly small and wearable in recent years. They often connect with a hand-held controller over short distances using Bluetooth. Often, either the controller or the device itself is connected to the Internet by means of Wi-Fi so that data can be sent directly to clinicians. But security experts have demonstrated that with easily available hardware, a user manual, and the device&#039;s PIN number, they can take control of a device or monitor the data it sends.

Medical devices don&#039;t get regular security updates, like smart phones and computers, because changes to their software could require recertification by regulators like the U.S. Food and Drug Administration (FDA). And FDA has focused on reliability, user safety, and ease of use—not on protecting against malicious attacks.]]></description>
		<content:encoded><![CDATA[<p>Could a wireless pacemaker let hackers take control of your heart?<br />
<a href="http://news.sciencemag.org/health/2015/02/could-wireless-pacemaker-let-hackers-take-control-your-heart" rel="nofollow">http://news.sciencemag.org/health/2015/02/could-wireless-pacemaker-let-hackers-take-control-your-heart</a></p>
<p>In a 2012 episode of the TV series Homeland, Vice President William Walden is assassinated by a terrorist who hacks into his Internet-enabled heart pacemaker and accelerates his heartbeat until he has a heart attack. A flight of fancy? Not everyone thinks so.</p>
<p>Internet security experts have been warning for years that such devices are open to both data theft and remote control by a hacker. In 2007, Vice President Dick Cheney&#8217;s cardiologist disabled the wireless functionality of his pacemaker because of just that risk. “It seemed to me to be a bad idea for the vice president to have a device that maybe somebody on a rope line or in the next hotel room or downstairs might be able to get into—hack into,” said the cardiologist, Jonathan Reiner of George Washington University Hospital in Washington, D.C., in a TV interview last year.</p>
<p>Medical devices such as insulin pumps, continuous glucose monitors, and pacemakers or defibrillators have become increasingly small and wearable in recent years. They often connect with a hand-held controller over short distances using Bluetooth. Often, either the controller or the device itself is connected to the Internet by means of Wi-Fi so that data can be sent directly to clinicians. But security experts have demonstrated that with easily available hardware, a user manual, and the device&#8217;s PIN number, they can take control of a device or monitor the data it sends.</p>
<p>Medical devices don&#8217;t get regular security updates, like smart phones and computers, because changes to their software could require recertification by regulators like the U.S. Food and Drug Administration (FDA). And FDA has focused on reliability, user safety, and ease of use—not on protecting against malicious attacks.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/10/28/cyber-security-flaws-can-kill/comment-page-1/#comment-1305206</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 01 Dec 2014 09:40:51 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=28047#comment-1305206</guid>
		<description><![CDATA[Coming Soon: Murder By Internet
http://www.cio.com/article/2852589/security0/coming-soon-murder-by-internet.html

Imagine a fleet of quad copters or drones equipped with explosives and controlled by terrorists. Or someone who hacks into a connected insulin pump and changes the settings in a lethal way. Or maybe the hacker who accesses a building&#039;s furnace and thermostat controls and runs the furnace full bore until a fire is started. 

 Those may all sound like plot material for a James Bond movie, but there are security experts who now believe, as does Jeff Williams, CTO of Contrast Security, that &quot;the Internet of Things will kill someone.&quot;

Williams, whose firm provides application security, doesn&#039;t know exactly how IoT might be used to kill someone or what device will be implicated in the nefarious scheme, but considers it a certainty that a connected device will play a role in a murder. 

 Similarly, Rashmi Knowles, chief security architect at RSA, said something similar in a recent blog post, imagining criminals hacking into medical devices and starting &quot;a complete new economy&quot; by blackmailing victims.

&quot;Question is, when is the first murder?&quot; wrote Knowles. 

Today, there is a new &quot;rush to connect things&quot; and &quot;it is leading to very sloppy engineering from a security perspective, which makes ... internet of things devices very attackable -- the way web applications were 10 years ago,&quot; said Williams.]]></description>
		<content:encoded><![CDATA[<p>Coming Soon: Murder By Internet<br />
<a href="http://www.cio.com/article/2852589/security0/coming-soon-murder-by-internet.html" rel="nofollow">http://www.cio.com/article/2852589/security0/coming-soon-murder-by-internet.html</a></p>
<p>Imagine a fleet of quad copters or drones equipped with explosives and controlled by terrorists. Or someone who hacks into a connected insulin pump and changes the settings in a lethal way. Or maybe the hacker who accesses a building&#8217;s furnace and thermostat controls and runs the furnace full bore until a fire is started. </p>
<p> Those may all sound like plot material for a James Bond movie, but there are security experts who now believe, as does Jeff Williams, CTO of Contrast Security, that &#8220;the Internet of Things will kill someone.&#8221;</p>
<p>Williams, whose firm provides application security, doesn&#8217;t know exactly how IoT might be used to kill someone or what device will be implicated in the nefarious scheme, but considers it a certainty that a connected device will play a role in a murder. </p>
<p> Similarly, Rashmi Knowles, chief security architect at RSA, said something similar in a recent blog post, imagining criminals hacking into medical devices and starting &#8220;a complete new economy&#8221; by blackmailing victims.</p>
<p>&#8220;Question is, when is the first murder?&#8221; wrote Knowles. </p>
<p>Today, there is a new &#8220;rush to connect things&#8221; and &#8220;it is leading to very sloppy engineering from a security perspective, which makes &#8230; internet of things devices very attackable &#8212; the way web applications were 10 years ago,&#8221; said Williams.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2014/10/28/cyber-security-flaws-can-kill/comment-page-1/#comment-1280771</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 05 Nov 2014 11:02:10 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=28047#comment-1280771</guid>
		<description><![CDATA[Israeli ex-spies want to help you defend your CAR from cybercrooks
Who needs a lock pick when you&#039;ve got an electronic key?
http://www.theregister.co.uk/2014/11/05/israeli_car_security_start_up/

Security shortcomings in new cars could nurture a new branch of the infosec industry in much the same way that Windows&#039; security failings gave rise to the antivirus industry 20 or so years ago, auto-security pioneers hope.

Former members of Unit 8200, the signals intelligence unit of the Israel Defense Forces, have banded together to create a start-up developing technology and services designed to protect connected cars from next generation hackers.

Car thieves are already taking advantage of electronic car entry and ignition systems to steal cars. Recent reports suggest that insurers are refusing cover for keyless Range Rovers in London following the rise of targeted attacks on keyless cars.

But there&#039;s also a more subtle and less immediate hacker threat.

Connected cars lay the groundwork for the introduction of new features, such as navigation by points of interest, music and video streaming, and also remote control of the vehicle via products and services such as GM’s OnStar and BMW&#039;s ConnectedDrive.

All of this extra internet-connected technology increases the number of way malicious parties might be able to hack potentially vulnerable vehicles.


Once inside, an attacker can utilise the vehicle’s internal communication bus and take control of additional modules inside the vehicle, including safety-critical systems like the ABS and engine ECUs (electronic computing units, the embedded computing systems in cars), according to Argus.]]></description>
		<content:encoded><![CDATA[<p>Israeli ex-spies want to help you defend your CAR from cybercrooks<br />
Who needs a lock pick when you&#8217;ve got an electronic key?<br />
<a href="http://www.theregister.co.uk/2014/11/05/israeli_car_security_start_up/" rel="nofollow">http://www.theregister.co.uk/2014/11/05/israeli_car_security_start_up/</a></p>
<p>Security shortcomings in new cars could nurture a new branch of the infosec industry in much the same way that Windows&#8217; security failings gave rise to the antivirus industry 20 or so years ago, auto-security pioneers hope.</p>
<p>Former members of Unit 8200, the signals intelligence unit of the Israel Defense Forces, have banded together to create a start-up developing technology and services designed to protect connected cars from next generation hackers.</p>
<p>Car thieves are already taking advantage of electronic car entry and ignition systems to steal cars. Recent reports suggest that insurers are refusing cover for keyless Range Rovers in London following the rise of targeted attacks on keyless cars.</p>
<p>But there&#8217;s also a more subtle and less immediate hacker threat.</p>
<p>Connected cars lay the groundwork for the introduction of new features, such as navigation by points of interest, music and video streaming, and also remote control of the vehicle via products and services such as GM’s OnStar and BMW&#8217;s ConnectedDrive.</p>
<p>All of this extra internet-connected technology increases the number of way malicious parties might be able to hack potentially vulnerable vehicles.</p>
<p>Once inside, an attacker can utilise the vehicle’s internal communication bus and take control of additional modules inside the vehicle, including safety-critical systems like the ABS and engine ECUs (electronic computing units, the embedded computing systems in cars), according to Argus.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
