But I'm sure TikTok is fine and 100% to be trusted.
Cybersecurity
c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.
THE RULES
Instance Rules
- Be respectful. Everyone should feel welcome here.
- No bigotry - including racism, sexism, ableism, homophobia, transphobia, or xenophobia.
- No Ads / Spamming.
- No pornography.
Community Rules
- Idk, keep it semi-professional?
- Nothing illegal. We're all ethical here.
- Rules will be added/redefined as necessary.
If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.
Learn about hacking
Other security-related communities [email protected] [email protected] [email protected] [email protected] [email protected]
Notable mention to [email protected]
Those things shouldn't even be connected to the internet.
They connect to allow the vitals to be pulled into the EMR to allow continuous documentation of vitals for the anesthesia record or central patient monitoring. More and more frequently, the database is not onsite and is shared amongst several sites within a hospital system.
But the device itself shouldn't need internet connectivity for this. That networking should be handled by a local master device, the same way access control systems (e.g. Door badge readers, alarm monitoring, etc) work.
Then this device would only use a local, isolated network to access the master device.
Might not be. This could have simply been some IT guy noticing that something kept trying to ping the outside world.
Why tho
Not sure. If true, prolly just generic data mining?
Would fake news ever report if it was pinging mountain view?
Might also not be this device that was specifically targeted. The backdoor could have been placed in component firmware for any generic components this device uses, or in some general software library that gets used all over the place.