Contactless payment, Artificial organ, Prosthesis, Device, Security, Computer worm

On Feb 26, 2019
@kaspersky shared
We recently completed the vulnerability assessment of @MotoricaRehab hi-tech artificial limbs so that their users will be #safer https://t.co/wjQSBZ6Yt9
Open

How to Attack and Defend a Prosthetic Arm

Like other IoT devices, the prosthetic arm sends statistics to the cloud, such as movement amplitudes, the arm’s positions, etc. And just like other IoT devices, this valuable invention ...

On Feb 26, 2019
@kaspersky shared
We recently completed the vulnerability assessment of @MotoricaRehab hi-tech artificial limbs so that their users will be #safer https://t.co/wjQSBZ6Yt9
Open

How to Attack and Defend a Prosthetic Arm

Like other IoT devices, the prosthetic arm sends statistics to the cloud, such as movement amplitudes, the arm’s positions, etc. And just like other IoT devices, this valuable invention ...

Ransomware – A closer look

Ransomware has emerged as one of the most serious online threats facing businesses.

MWC 2019: Your bionic hand is now at risk from hackers

Infiltrating pacemakers is yesterday’s news. Advanced prosthetic limbs are now on the hit list.

Building a Smart Home Cloud Service with Google

Recently, my colleague Dan Myers wrote a great piece on IoT & Google Assistant, introducing the core concepts of the Smart Home Actions…

A helping hand for a smart hand: How we hacked it so others wouldn’t

At Mobile World Congress 2019, our experts presented a study on the security of Motorica smart artificial limbs.

Innovation will drive the banking trends of 2019

The banking trends of 2019 will be dominated by innovation. It may sound glib, but it will be true as ever. Innovation will change the industry, but how?