Do No Harm. Matthew Webster
href="https://www.techrepublic.com/article/how-the-term-internet-of-things-was-invented/">https://www.techrepublic.com/article/how-the-term-internet-of-things-was-invented/.
3 3 “How to Determine if Your Product Is a Medical Device,” https://www.fda.gov/medical-devices/classify-your-medical-device/how-determine-if-your-product-medical-device.
4 4 OWASP Internet of Things Project 2018 https://wiki.owasp.org/index.php/OWASP_Internet_of_Things_Project.
5 5 Ibid.
6 6 Ibid.
7 7 Ibid.
8 8 Ibid.
9 9 Ibid.
10 10 Ibid.
11 11 Ibid.
12 12 Ibid.
13 13 Ibid.
14 14 Ibid.
15 15 Josh Fruhlinger, “The Mirai botnet explained: How teen scammers and CCTV cameras almost brough down the internet,” 2018, https://www.csoonline.com/article/3258748/the-mirai-botnet-explained-how-teen-scammers-and-cctv-cameras-almost-brought-down-the-internet.html.
16 16 “Cybersecurity Vulnerabilities Identified in St. Jude Medical's Implantable Cardiac Devices and Merlin@home Transmitter: FDA Safety Communication,” https://www.fda.gov/medical-devices/safety-communications/cybersecurity-vulnerabilities-identified-st-jude-medicals-implantable-cardiac-devices-and-merlinhome.
17 17 “Securing the Internet of Medical Things (IoMT),” https://802secure.com/wp-content/themes/802secure/pdf/AIRSHIELD-Health-Data-Sheet.pdf.
18 18 “Clearwater Medical Device Security and CIO Insomnia,” https://clearwatercompliance.com/blog/medical-device-security-and-cio-insomnia/.
19 19 Ibid.
20 20 “CVE Detail,” https://www.cvedetails.com/product/739/Microsoft-Windows-Xp.html?vendor_id=26.
21 21 Matthew Humphries, “FBI Warns Against Using Hotel Wi-Fi for Work: The FBI says hotels in cities across the US have lax security allowing for easy exploitation by malicious actors,” 2020, https://www.entrepreneur.com/article/357524.
22 22 Jefferson B. Sessions II, 2018, https://www.wyden.senate.gov/imo/media/doc/08212018%20RW%20Stingray%20Jamming%20Letter%20to%20DOJ.pdf.
23 23 Zack Whittaker, “New flaws in 4G, 5G allow attackers to intercept calls and track phone locations,” 2019, https://techcrunch.com/2019/02/24/new-4g-5g-security-flaws/.
24 24 Wikipedia, https://en.wikipedia.org/wiki/Bluetooth, accessed October 24, 2020.
25 25 “Common Vulnerabilities Exposures,” https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=Bluetooth, accessed October 24, 2020.
26 26 “FDA News Release FDA Informs Patients, Providers and Manufacturers About Potential Cybersecurity Vulnerabilities in Certain Medical Devices with Bluetooth Low Energy,” March 3, 2020, https://www.fda.gov/news-events/press-announcements/fda-informs-patients-providers-and-manufacturers-about-potential-cybersecurity-vulnerabilities-0.
27 27 Ibid.
28 28 Cristina Ardila, “Six Ways NFC Helps Healthcare,” 2015, https://www.nxp.com/company/blog/six-ways-nfc-helps-healthcare:BL-6-WAYS-NFC-HELPS-HEALTHCARE.
29 29 Zak Doffman, “New Google Android Threat: NFC Exposes Devices To Malware Attack—Update Settings Now,” 2019, https://www.forbes.com/sites/zakdoffman/2019/11/02/new-android-threat-contactless-payment-technology-open-to-attackchange-your-settings/#4ed6ccf45cde.
30 30 Marc Laliberte, “How data breaches forced Amazon to update S3 bucket security,” 2019, https://www.helpnetsecurity.com/2019/09/23/s3-bucket-security/.
31 31 Truffle Bot, “An API Worm In The Making: Thousands of Secrets Found In Open S3 Buckets,” 2020, https://trufflesecurity.com/blog/an-s3-bucket-worm-in-the-making-thousands-of-secrets-found-in-open-s3-buckets.
32 32 Spencer Gietzen, “S3 Ransomware Part 1: Attack Vector,”