Explore the critical security vulnerabilities in DICOM protocols exposed online through this eye-opening 37-minute Black Hat conference talk. Delve into the findings of internet-wide research revealing how hackers can easily locate, access, and exploit exposed DICOM endpoints to extract and manipulate patient data. Gain valuable insights into the methods used to bypass DICOM security controls by analyzing vendor and service provider statements on DICOM standard compliance. Learn about the potential risks to millions of patient records and the urgent need for improved security measures in legacy medical imaging protocols.
Overview
Syllabus
Millions of Patient Records at Risk: The Perils of Legacy Protocols
Taught by
Black Hat