{"id":408,"date":"2016-02-12T12:00:34","date_gmt":"2016-02-12T19:00:34","guid":{"rendered":"http:\/\/dshsolutions.com\/wordpress\/?p=408"},"modified":"2016-02-12T12:00:34","modified_gmt":"2016-02-12T19:00:34","slug":"kaspersky-researcher-shows-how-he-hacked-his-hospital-while-sitting-in-his-car-fossbytes","status":"publish","type":"post","link":"https:\/\/dshsolutions.com\/wordpress\/kaspersky-researcher-shows-how-he-hacked-his-hospital-while-sitting-in-his-car-fossbytes\/","title":{"rendered":"Kaspersky Researcher Shows How He Hacked His Hospital While Sitting In His Car &#8211; fossBytes"},"content":{"rendered":"<p>Please note that he noticed the potential security risks inherent in the hospital&#8217;s system and medical equipment and got permission to run tests to expose the vulnerabilities.<\/p>\n<blockquote><p>When we visit a hospital, we put our complete trust in our doctor and the medical equipment that he\/she uses. With advancement in technology, these equipment have become more complex and interconnected. Sadly, ensuring standard cybersecurity measures is not a top priority of the medical professionals. This fact was recently outlined by a Kaspersky security researcher who hacked a hospital while sitting in his car.<\/p><\/blockquote>\n<p>Source: <em><a href=\"http:\/\/fossbytes.com\/kaspersky-researcher-hacks-a-hospital\/\">Kaspersky Researcher Shows How He Hacked His Hospital While Sitting In His Car &#8211; fossBytes<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Please note that he noticed the potential security risks inherent in the hospital&#8217;s system and medical equipment and got permission to run tests to expose the vulnerabilities. When we visit a hospital, we put our complete trust in our doctor and the medical equipment that he\/she uses. With advancement in technology, these equipment have become [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,4,5,8],"tags":[],"class_list":["post-408","post","type-post","status-publish","format-standard","hentry","category-hardware","category-privacy","category-security-2","category-software"],"_links":{"self":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts\/408","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/comments?post=408"}],"version-history":[{"count":0,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts\/408\/revisions"}],"wp:attachment":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/media?parent=408"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/categories?post=408"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/tags?post=408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}