Data Transfer Protocol Flaw Affects Medical Devices

Share post:

Kaspersky researchers have uncovered 33 critical flaws in MMQT, a prominent protocol used by medical devices.

The MMQT Protocol is used for remote patent monitoring including the continuous recording of heart activity and other health data. They also discovered vulnerabilities in the Qualcomm Snapdragon Wearable platform, which is used in many wearable health trackers.

When researchers identified the flaw in the MMQT protocol, they found that the flaw lies in its authentication, which they say is “completely optional and rarely includes encryption.”

This makes the protocol very vulnerable to man-in-the-middle attacks. In addition, medical data, personal information and a person’s whereabouts are at risk of theft.

To ensure the security of patient data, Kaspersky has identified several steps healthcare providers must follow.

This includes checking the security of the application or device proposed by the hospital and minimizing the data transmitted by telehealth apps.

Healthcare providers are also advised to change passwords from standard passwords and use encryption if the device provides it.

For more information, read the original story in TechRepublic.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Cyber Security Today, March 27, 2024 – A botnet exploits old routers, a new malware loader discovered, and more warnings about downloading code from...

This episode reports on a new network of 40,000 infected small and home office routers and other devices that are part of a criminal botnet

Cyber Security Today, March 25, 2024 – A suspected China threat actor going after unpatched F5 and ScreenConnet installations

This episode reports on a new campaign stealing email passwords ,the latest data breaches

A hacker’s view of the civic infrastructure: Hashtag Trending, the Weekend Edition for March 23rd, 2024

What does the civic infrastructure look like through the eyes of a hacker? The legendary general Sun Tzu in the Art of War said that in order to defeat your enemy, you must first understand your enemy. How do you do this? He said, “to know your enemy, you must become your enemy.” If we

Cyber Security Today, Week in Review for week ending Friday, March 22, 2024

This episode features discussion on lessons learned from the ransomware attack on the British Library, advice for managing expectations of IT/security teams, why firms are leaving Google Firebase unprotecte

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways