Title: How to Attack and Defend a Prosthetic Arm
Published: Tue, 26 Feb 2019 11:00:46 +0000
Description: Like other IoT devices, the prosthetic arm sends statistics to the cloud, such as movement amplitudes, the arm’s positions, etc. And just like other IoT devices, this valuable invention must be checked for vulnerabilities. In our research, we focused on those attack vectors that can be implemented without the arm owner’s knowledge.
Read full article on SECURELIST.COM