• About
  • Advertise
  • Careers
  • Contact Us
Saturday, June 14, 2025
  • Login
No Result
View All Result
NEWSLETTER
Tech | Business | Economy
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Mobility
    • Environment
    • Travel
    • StartUPs
  • Economy
  • TECHECONOMY TV
  • TBS
  • About Us
  • Contact Us
  • Telecoms
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Mobility
    • Environment
    • Travel
    • StartUPs
  • Economy
  • TECHECONOMY TV
  • TBS
  • About Us
  • Contact Us
  • Telecoms
No Result
View All Result
Tech | Business | Economy
No Result
View All Result
ADVERTISEMENT
Home ConsumerTech Gadgets and Appliances

Tracking Your Heartbeat, Payment Data? Vulnerabilities Found in the Data Transfer Protocol for Wearable Devices

by Yinka Okeowo
February 4, 2022
in Gadgets and Appliances
0
UBA
Advertisements

Cybersecurity experts have found out that the most commonly used protocol for transferring data from wearable devices used for remote patient monitoring contained 33 vulnerabilities, including 19 “critical vulnerabilities” in 2021 alone.

According to the Kaspersky experts, this is 10 more critical vulnerabilities than in 2020, and many of them remain unpatched. Some of these vulnerabilities give attackers the potential to intercept data being sent online from the device.

The ongoing pandemic has led to a rapid digitalisation of the healthcare sector. With hospitals and healthcare staff overwhelmed, and many people quarantined at home, organisations have been forced to rethink how patient care is delivered.

In fact, recent Kaspersky research found that 91% of global healthcare providers have implemented telehealth capabilities.

However, this rapid digitalisation has created new security risks, especially when it comes to patient data. 

Part of telehealth includes remote patient monitoring, which is done using so-called wearable devices and monitors.

These include gadgets that can continuously or at intervals track a patient’s health indicators, such as cardiac activity.

The MQTT protocol is the most common protocol for transmitting data from wearable devices and sensors because it’s easy and convenient. That’s why it can be found not only in wearable devices, but also in almost any smart gadget.

Unfortunately, when using MQTT, authentication is completely optional and rarely includes encryption.

This makes MQTT highly susceptible to man in the middle attacks (when attackers can place themselves between “two parties” while they communicate), meaning any data transferred over the Internet could potentially be stolen.

When it comes to wearable devices, that information could include highly sensitive medical data, personal information, and even a person’s movements.

Since 2014, 90 vulnerabilities in MQTT have been discovered, including critical, many of which remain unpatched to this day. In 2021, there were 33 newly discovered vulnerabilities, including 18 critical ones—10 more than in 2020. All of these vulnerabilities put patients at risk of having their data stolen.

Number of vulnerabilities found in the MQTT protocol, 2014-2021
Advertisements
MTN ADS
Number of vulnerabilities found in the MQTT protocol, 2014-2021

Kaspersky researchers found vulnerabilities not only in the MQTT protocol but also one of the most popular platforms for wearable devices: the Qualcomm Snapdragon Wearable platform.

There have been more than 400 vulnerabilities found since the platform was launched; not all have been patched, including some from 2020.

It’s worth noting that most wearable devices track both your health data and your location and movements. This opens up the possibility of not just stealing data but also potentially stalking.

“The pandemic has led to a sharp growth in the telehealth market, and this doesn’t just involve communicating with your doctor via video software. We’re talking about a whole range of complex, rapidly evolving technologies and products, including specialised applications, wearable devices, implantable sensors, and cloud-based databases. However, many hospitals are still using untested third-party services to store patient data, and vulnerabilities in healthcare wearable devices and sensors remain open. Before implementing such devices, learn as much as you can about their level of security to keep the data of your company and your patients safe,” comments Maria Namestnikova, Head of the Russian Global Research and Analysis Team (GReAT) at Kaspersky.

How to keep patient data safe: Kaspersky recommends that healthcare providers:

  • Check the security of the application or device suggested by the hospital or medical organisation
  • Minimise the data transferred by telehealth apps if possible (e.g. don’t let the device send the location data if it’s not needed)
  • Change passwords from default ones and use encryption if the device offers this

Loading

Author

  • Yinka Okeowo
    Yinka Okeowo

    View all posts
0Shares
Tags: digitalisationKasperskyMQTT protocolwearable devices
Yinka Okeowo

Yinka Okeowo

Next Post

Technology and Climate: In Support of a Pragmatic Approach

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Recommended

Airtel Tariff Adjustment | Dinesh Balsingh, MD/CEO, Airtel Nigeria.

Airtel Applauds NCC over Tariff Adjustment Approval

5 months ago
How to Create Impactful CSR Programs, Promote Sustainable Development in Communities

How to Create Impactful CSR Programs, Promote Sustainable Development in Communities

1 year ago

Popular News

    Connect with us

    Currently Playing

    How to be productive this year ! #productivity #timelimit

    How to be productive this year ! #productivity #timelimit

    00:00:51

    TE Weather

    TE PODCAST

    Techeconomy Podcast
    Techeconomy Podcast

    Every week we will bring new stories from startups and influencers who are shaping and changing the world we live in. We’ll also bring you reports on topics you should know.

    Follow us @techeconomyng for more.

    Listen OnSpotify
    TECH TALK EPISODE 2
    byTecheconomy

    PRODUCTIVITY AND WORK-Life Balance

    TECH TALK EPISODE 2
    Episode play icon
    TECH TALK EPISODE 2
    Episode Description
    Episode play icon
    CYBERSECURITY ESSENTIALS
    Episode Description
    Episode play icon
    Digital Marketing Trends and strategies for 2025 and beyond
    Episode Description
    Episode play icon
    Major Lesson for Techies in 2024 and Projections for 2025
    Episode Description
    Episode play icon
    Major Lessons for Techies in an AI-Driven World | Techeconomy Business Series Highlights
    Episode play icon
    Maximizing Profitability Through Seasonal Sales: Strategies For Success
    Episode play icon
    Techeconomy Business Series
    Episode Description
    Episode play icon
    PRIVACY IN THE ERA OF AI: GETTING YOUR BUSINESS READY
    Episode Description
    Episode play icon
    Unravel the Secrets of Marketing Everywhere All At Once with Isaac Akanni from Infobip | Infowave Podcast Episode 1
    Episode Description
    Episode play icon
    The Role of Ed-tech in Life Long Learning and Continuous Education
    Episode Description
    Search Results placeholder
    • About
    • Advertise
    • Careers
    • Contact Us

    © 2017 TECHECONOMY.

    No Result
    View All Result
    • News
    • Tech
      • DisruptiveTECH
      • ConsumerTech
      • How To
      • TechTAINMENT
    • Business
      • Mobility
      • Environment
      • Travel
      • StartUPs
    • Economy
    • TECHECONOMY TV
    • TBS
    • About Us
    • Contact Us

    © 2017 TECHECONOMY.

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In
    Translate »