Millions of Patient Records at Risk: The Perils of Legacy Protocols

  Рет қаралды 3,114

Black Hat

Black Hat

Күн бұрын

...This talk will explain the security shortcomings of DICOM when it is exposed online and provide insights from our internet-wide research. We'll show how hackers can easily find, access, and exploit the exposed DICOM endpoints, extract all patients' data, and even alter medical records. Additionally, we'll explain how we were able to bypass DICOM security controls by gathering information from the statements provided by vendors and service providers regarding their adherence to DICOM standards....
By: Ibrahim Akkulak , Sina Yazdanmehr
Full Abstract and Presentation Materials:
www.blackhat.c...

Пікірлер
Three New Attacks Against JSON Web Tokens
40:18
Black Hat
Рет қаралды 7 М.
Quilt Challenge, No Skills, Just Luck#Funnyfamily #Partygames #Funny
00:32
Family Games Media
Рет қаралды 55 МЛН
So Cute 🥰 who is better?
00:15
dednahype
Рет қаралды 19 МЛН
小丑教训坏蛋 #小丑 #天使 #shorts
00:49
好人小丑
Рет қаралды 54 МЛН
Privacy Detective: Sniffing Out Your Data Leaks for Android
30:04
Google’s Quantum Chip: Did We Just Tap Into Parallel Universes?
9:34
Practical LLM Security: Takeaways From a Year in the Trenches
37:01
HTTPS, SSL, TLS & Certificate Authority Explained
43:29
Laith Academy
Рет қаралды 146 М.
Project Zero: Ten Years of 'Make 0-Day Hard'
40:20
Black Hat
Рет қаралды 2,9 М.
Lisbon Account Protocol and challenges - Tech Talk
33:59
Confidential Computing Consortium
Рет қаралды 76
Quilt Challenge, No Skills, Just Luck#Funnyfamily #Partygames #Funny
00:32
Family Games Media
Рет қаралды 55 МЛН