How to Attack and Defend a Prosthetic Arm

Title: How to Attack and Defend a Prosthetic Arm

Published:  Tue, 26 Feb 2019 11:00:46 +0000

Description: Like other IoT devices, the prosthetic arm sends statistics to the cloud, such as movement amplitudes, the arm’s positions, etc. And just like other IoT devices, this valuable invention must be checked for vulnerabilities. In our research, we focused on those attack vectors that can be implemented without the arm owner’s knowledge.

Read full article on SECURELIST.COM