Include:
Tech
Cybersecurity
Business Strategy
Channel Insights
Stay Connected
Acer America
Acer America Corp. is a computer manufacturer of business and consumer PCs, notebooks, ultrabooks, projectors, servers, and storage products.

Location

333 West San Carlos Street
San Jose, California 95110
United States

WWW: acer.com

ChannelPro Network Awards

hello 2
hello 3

Press Releases

November 1, 2018 |

Kaspersky Lab Research Reveals Security Vulnerabilities in Brain Stimulation Technology

New report from Kaspersky Lab and the University of Oxford Functional Neurosurgery Group explores existing and future risk scenarios impacting implanted devices

Researchers from†Kaspersky Lab†and the†University of Oxford Functional Neurosurgery Group†have issued a new†report, which identifies existing and potential vulnerabilities in implanted brain stimulation devices. As scientists are using these devices to explore how memories are created in the brain and can be targeted, restored and enhanced, these vulnerabilities could be exploited in the future to steal personal information, alter or erase memories or cause physical harm.

For this project, the researchers combined practical and theoretical analysis to explore the current vulnerabilities in implanted devices used for deep brain stimulation. Known as Implantable Pulse Generators (IPGs) or neurostimulators, these devices send electrical impulses to specific targets in the brain for the treatment of disorders such as Parkinson’s disease, essential tremor, major depression, and Obsessive–Compulsive Disorder. The latest generation of these implants comes with management software for both clinicians and patients, installed on commercial-grade tablets and smartphones. The connection between them is based on the standard Bluetooth protocol.

The researchers found a number of existing and potential risk scenarios, each of which could be exploited by attackers. These include:

  • Exposed connected infrastructure. The researchers found one serious vulnerability and several worrying misconfigurations in an online management platform popular with surgical teams, which could allow an attacker to access sensitive data and treatment procedures.†
  • Insecure or unencrypted data transfer between the implant, the programming software and any associated networks. This could enable malicious tampering of a patient’s implant or even tampering of whole groups of implants (and patients) connected to the same infrastructure. Manipulation could result in changed settings, causing pain, paralysis or the theft of private and confidential personal data.
  • Design constraints as patient safety takes precedence over device security. For example, a medical implant needs to be controlled by physicians in emergency situations, including when a patient is rushed into a hospital far from their home. This precludes the use of any password that isn’t widely known among clinicians. Further, it means that by default such implants need to be fitted with a software ‘backdoor.’
  • Insecure behavior by medical staff. Devices with patient-critical software were found being left with default passwords, used to browse the internet or with additional apps downloaded onto them.

Addressing these vulnerable areas is key because the researchers estimate that over the coming decades, more advanced neurostimulators and a deeper understanding of how the human brain forms and stores memories will accelerate the development and use of such technology and create in new opportunities for cyberattackers.†

Within five years, scientists expect to be able to electronically record the brain signals that build memories and then enhance or even rewrite them before putting them back into the brain. A decade from now, the first commercial memory boosting implants could appear on the market – and, within 20 years or so, the technology could be advanced enough to allow for extensive control over memories.

New threats resulting from this could include the mass manipulation of groups through implanted or erased memories; while ‘repurposed’ cyberthreats could target new opportunities for cyberespionage or the theft, deletion or ‘locking’ of memories (for example, in return for a ransom).†

“Current vulnerabilities matter, because the technology that exists today is the foundation for what will exist in the future,” said Dmitry Galov, junior security researcher, Global Research and Analysis Team, Kaspersky Lab. “Although no attacks targeting neurostimulators have been observed in the wild, points of weakness exist that will not be hard to exploit. We need to bring together healthcare professionals, the cybersecurity industry and manufacturers to investigate and mitigate all potential vulnerabilities, both the ones we see today and the ones that will emerge in the coming years.”

“Memory implants are a real and exciting prospect, offering significant healthcare benefits,” added Laurie Pycroft, doctoral researcher in the University of Oxford Functional Neurosurgery Group. “The prospect of being able to alter and enhance our memories with electrodes may sound like fiction, but it is based on solid science, the foundations of which already exist today. †Memory prostheses are only a question of time. Collaborating to understand and address emerging risks and vulnerabilities, and doing so while this technology is still relatively new, will pay off in the future.”


Editor’s Choice

Broadcom-VMware Shakeout: How the Channel Has Been Affected By the Big Industry Acquisition

April 11, 2024 |

Industry experts weigh in on the “messy breakup” that MSPs were left with after Broadcom’s acquisition of VMWare.

Selling Cybersecurity: How MSPs Can Become Crucial Partners in Managing Risk

March 27, 2024 | David Powell

MSPs should try to bring an end customer into the cybersecurity fold. Here are some ways to help drive that.

3 Questions with Ingram Micro’s Sanjib Sahoo on Integrating AI into Managed Services

March 25, 2024 |

Ingram Micro’s EVP and chief digital officer shares some insights on how MSPs can effectively integrate artificial intelligence into their business operations.


Related News

Growing the MSP

Explore ChannelPro

Events

Reach Our Audience