
{"id":1934,"date":"2012-10-25T08:26:22","date_gmt":"2012-10-25T11:26:22","guid":{"rendered":"http:\/\/www.talsoft.com.ar\/?p=1934"},"modified":"2012-10-25T08:26:22","modified_gmt":"2012-10-25T11:26:22","slug":"peligro-remoto-lograron-hackear-marcapasos-para-provocar-descargas-fatales","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/peligro-remoto-lograron-hackear-marcapasos-para-provocar-descargas-fatales\/","title":{"rendered":"Peligro remoto: lograron hackear marcapasos para provocar descargas fatales"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/tn.cdncmd.com\/sites\/default\/files\/imagecache\/rela-310x174\/2012\/10\/24\/marcapasos.jpg\" alt=\"MARCAPASOS. El aparato mejora la vida de miles de pacientes en el mundo.\" \/><\/p>\n<p>Hace poco m\u00e1s de una semana, el experto en seguridad inform\u00e1tica Barnaby Jack hizo una\u00a0<strong>demostraci\u00f3n escalofriante<\/strong>\u00a0durante la cumbre Breakpoint 2012, en Melbourne, Australia. Gracias a una laptop, Barnaby logr\u00f3 conectarse a un marcapasos ubicado a unos diez metros para suministrar\u00a0<strong>descargas mortales de 830 voltios<\/strong>.<\/p>\n<p>&#8220;Con una tensi\u00f3n m\u00e1xima de 830 voltios, no es dif\u00edcil ver por qu\u00e9 esto es una caracter\u00edstica bastante mortal, suficiente para provocar un paro card\u00edaco, pero esto no para aqu\u00ed, tambi\u00e9n tienen la posibilidad de recargar el dispositivo y suministrar\u00a0<strong>descargas en bucle&#8221;<\/strong>, explic\u00f3 Jack.<\/p>\n<p>Adem\u00e1s, al tomar control del aparato, se obtiene datos como &#8220;el\u00a0<strong>nombre del paciente, los par\u00e1metros de su terapia<\/strong>, su fecha de nacimiento e informaci\u00f3n adicional de su doctor&#8221;, explic\u00f3 el cient\u00edfico en inform\u00e1tica Kevin Fu de la Universidad de Massachussetts al presentar un informe similar este mi\u00e9rcoles.<\/p>\n<p>&#8220;El peor escenario que se me ocurre, es que si esto es posible con el 100% de este tipo dispositivos, bastar\u00eda cargar una\u00a0<strong>actualizaci\u00f3n de firmware<\/strong>\u00a0para\u00a0<strong>infectar el programa base y esparcirlo en todos los dispositivos<\/strong>&#8220;, dijo Jack, seg\u00fan la\u00a0<a href=\"http:\/\/www.scmagazine.com.au\/News\/319508,hacked-terminals-capable-of-causing-pacemaker-mass-murder.aspx\">revista australiana\u00a0<em>SC<\/em><\/a>. En sus palabras, esto permitir\u00eda matar a una persona o\u00a0<strong>&#8220;cometer un asesinato en masa&#8221;<\/strong>.<\/p>\n<p>Los D<strong>esfibriladores Card\u00edacos Implantables<\/strong>\u00a0(DCI) o marcapasos reciben se\u00f1ales inal\u00e1mbricas a peque\u00f1a distancia, pero la\u00a0<strong>tecnolog\u00eda expande el alcance de los aparatos<\/strong>\u00a0y de paso\u00a0<strong>mejora el potencial para interceptar la informaci\u00f3n<\/strong>.<\/p>\n<p>Los expertos subrayaron que no hay hasta la fecha informes sobre un ataque de hackers contra un marcapasos, pero quisieron advertir a los fabricantes sobre la\u00a0<strong>necesidad de reforzar la seguridad de los aparatos m\u00e9dicos<\/strong>.<\/p>\n<p>Seg\u00fan dijo Fu,\u00a0las posibilidades de que un asesino se acerque a alguien con la intenci\u00f3n de manipular su DCI es muy remota. &#8220;Quiz\u00e1 el escenario de un asesino sea bueno para una novela de espionaje, pero hay formas mucho m\u00e1s simples de lograr algo como eso&#8221;, afirm\u00f3.<\/p>\n<div>\u00a0Fuente: tn.com.ar<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Hace poco m\u00e1s de una semana, el experto en seguridad inform\u00e1tica Barnaby Jack hizo una\u00a0demostraci\u00f3n escalofriante\u00a0durante la cumbre Breakpoint 2012, en Melbourne, Australia. Gracias a una laptop, Barnaby logr\u00f3 conectarse a un marcapasos ubicado a unos diez metros para suministrar\u00a0descargas mortales de 830 voltios. &#8220;Con una tensi\u00f3n m\u00e1xima de 830 voltios, no es dif\u00edcil ver [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-1934","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Peligro remoto: lograron hackear marcapasos para provocar descargas fatales<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/peligro-remoto-lograron-hackear-marcapasos-para-provocar-descargas-fatales\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/peligro-remoto-lograron-hackear-marcapasos-para-provocar-descargas-fatales\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/peligro-remoto-lograron-hackear-marcapasos-para-provocar-descargas-fatales\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Peligro remoto: lograron hackear marcapasos para provocar descargas fatales\",\"datePublished\":\"2012-10-25T11:26:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/peligro-remoto-lograron-hackear-marcapasos-para-provocar-descargas-fatales\/\"},\"wordCount\":352,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/peligro-remoto-lograron-hackear-marcapasos-para-provocar-descargas-fatales\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/tn.cdncmd.com\/sites\/default\/files\/imagecache\/rela-310x174\/2012\/10\/24\/marcapasos.jpg\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/peligro-remoto-lograron-hackear-marcapasos-para-provocar-descargas-fatales\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/peligro-remoto-lograron-hackear-marcapasos-para-provocar-descargas-fatales\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Peligro remoto: lograron hackear marcapasos para provocar descargas fatales\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/peligro-remoto-lograron-hackear-marcapasos-para-provocar-descargas-fatales\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/peligro-remoto-lograron-hackear-marcapasos-para-provocar-descargas-fatales\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/tn.cdncmd.com\/sites\/default\/files\/imagecache\/rela-310x174\/2012\/10\/24\/marcapasos.jpg\",\"datePublished\":\"2012-10-25T11:26:22+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/peligro-remoto-lograron-hackear-marcapasos-para-provocar-descargas-fatales\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/peligro-remoto-lograron-hackear-marcapasos-para-provocar-descargas-fatales\/#primaryimage\",\"url\":\"http:\/\/tn.cdncmd.com\/sites\/default\/files\/imagecache\/rela-310x174\/2012\/10\/24\/marcapasos.jpg\",\"contentUrl\":\"http:\/\/tn.cdncmd.com\/sites\/default\/files\/imagecache\/rela-310x174\/2012\/10\/24\/marcapasos.jpg\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Peligro remoto: lograron hackear marcapasos para provocar descargas fatales","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/peligro-remoto-lograron-hackear-marcapasos-para-provocar-descargas-fatales\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/peligro-remoto-lograron-hackear-marcapasos-para-provocar-descargas-fatales\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/peligro-remoto-lograron-hackear-marcapasos-para-provocar-descargas-fatales\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Peligro remoto: lograron hackear marcapasos para provocar descargas fatales","datePublished":"2012-10-25T11:26:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/peligro-remoto-lograron-hackear-marcapasos-para-provocar-descargas-fatales\/"},"wordCount":352,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/peligro-remoto-lograron-hackear-marcapasos-para-provocar-descargas-fatales\/#primaryimage"},"thumbnailUrl":"http:\/\/tn.cdncmd.com\/sites\/default\/files\/imagecache\/rela-310x174\/2012\/10\/24\/marcapasos.jpg","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/peligro-remoto-lograron-hackear-marcapasos-para-provocar-descargas-fatales\/","url":"https:\/\/www.talsoft-security.com\/site\/peligro-remoto-lograron-hackear-marcapasos-para-provocar-descargas-fatales\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Peligro remoto: lograron hackear marcapasos para provocar descargas fatales","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/peligro-remoto-lograron-hackear-marcapasos-para-provocar-descargas-fatales\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/peligro-remoto-lograron-hackear-marcapasos-para-provocar-descargas-fatales\/#primaryimage"},"thumbnailUrl":"http:\/\/tn.cdncmd.com\/sites\/default\/files\/imagecache\/rela-310x174\/2012\/10\/24\/marcapasos.jpg","datePublished":"2012-10-25T11:26:22+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/peligro-remoto-lograron-hackear-marcapasos-para-provocar-descargas-fatales\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/peligro-remoto-lograron-hackear-marcapasos-para-provocar-descargas-fatales\/#primaryimage","url":"http:\/\/tn.cdncmd.com\/sites\/default\/files\/imagecache\/rela-310x174\/2012\/10\/24\/marcapasos.jpg","contentUrl":"http:\/\/tn.cdncmd.com\/sites\/default\/files\/imagecache\/rela-310x174\/2012\/10\/24\/marcapasos.jpg"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1934","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=1934"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1934\/revisions"}],"predecessor-version":[{"id":1935,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1934\/revisions\/1935"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=1934"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=1934"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=1934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}