Stories
Slash Boxes
Comments

SoylentNews is people

posted by CoolHand on Sunday October 18 2015, @11:58PM   Printer-friendly
from the tin-foil-hat-time dept.

Behold the future: attackers can already get between brain-waves and hospital kit, and it's just going to get worse according to IOActive senior consultant Alejandro Hernández.

Hernández says the ability to steal, manipulate, and replay brain waves used in electroencephalography (EEG) is already emerging, with consumer-grade kit already able to be hacked and the health care industry taking few precautions to properly protect recorded brain waves.

After decades in labs and hospitals, encephalography is steadily being implemented in lightweight consumer headsets and other devices that as yet remain largely experimental or gimmicky.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by Snotnose on Monday October 19 2015, @04:21AM

    by Snotnose (1623) on Monday October 19 2015, @04:21AM (#251695)

    A few years back my ex got an iPhone with a fingerprint scanner. I told her to never use it. Why? If someone hacks her password she can change it. If someone hacks her fingerprint, well....

    Fast forward a year or two, my new laptop has a fingerprint scanner. Guess what? Damn thing is so convenient I use it 3-4 times a day. Only times I don't use it is when it doesn't work (damn thing is buggy as hell, about 50% of the time it hangs and I have to enter my password).

    I should know better, yet I still use the thing.

    --
    I came. I saw. I forgot why I came.
    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 0) by Anonymous Coward on Monday October 19 2015, @04:32AM

    by Anonymous Coward on Monday October 19 2015, @04:32AM (#251698)

    The first problem is that proprietary software is being used at all. The second problem is that you're willing to sacrifice privacy and security just for some convenience.

    • (Score: 2) by wonkey_monkey on Monday October 19 2015, @08:40AM

      by wonkey_monkey (279) on Monday October 19 2015, @08:40AM (#251740) Homepage

      The second problem is that you're willing to sacrifice privacy and security just for some convenience.

      And you've never done that? Ever?

      --
      systemd is Roko's Basilisk