Data Transfer Protocol Flaw Affects Medical Devices

Share post:

Kaspersky researchers have uncovered 33 critical flaws in MMQT, a prominent protocol used by medical devices.

The MMQT Protocol is used for remote patent monitoring including the continuous recording of heart activity and other health data. They also discovered vulnerabilities in the Qualcomm Snapdragon Wearable platform, which is used in many wearable health trackers.

When researchers identified the flaw in the MMQT protocol, they found that the flaw lies in its authentication, which they say is “completely optional and rarely includes encryption.”

This makes the protocol very vulnerable to man-in-the-middle attacks. In addition, medical data, personal information and a person’s whereabouts are at risk of theft.

To ensure the security of patient data, Kaspersky has identified several steps healthcare providers must follow.

This includes checking the security of the application or device proposed by the hospital and minimizing the data transmitted by telehealth apps.

Healthcare providers are also advised to change passwords from standard passwords and use encryption if the device provides it.

For more information, read the original story in TechRepublic.

SUBSCRIBE NOW

Related articles

Sleeper Supply Chain Attack Activates After 6 Years

A coordinated supply chain attack has compromised between 500 and 1,000 e-commerce websites by exploiting vulnerabilities in 21...

Russian-Controlled Open Source Tool Raises Alarms Over U.S. Cybersecurity

A widely used open-source Go library, easyjson, used in healthcare, finance and even defence has come under scrutiny...

Signal Archiving Tool Used By Trump Admin Is Breached, Raising Alarms Over Messaging Security (EDITORIAL)

(EDITORIAL) A messaging tool used by Trump administration officials to archive encrypted Signal messages has been hacked —...

Anthropic Warns: AI “Virtual Employees” Could Pose Security Risks Within a Year

Anthropic, a leading artificial intelligence company, anticipates that AI-powered virtual employees could begin operating within corporate networks as...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways