<code id='16B8CA2E4E'></code><style id='16B8CA2E4E'></style>
    • <acronym id='16B8CA2E4E'></acronym>
      <center id='16B8CA2E4E'><center id='16B8CA2E4E'><tfoot id='16B8CA2E4E'></tfoot></center><abbr id='16B8CA2E4E'><dir id='16B8CA2E4E'><tfoot id='16B8CA2E4E'></tfoot><noframes id='16B8CA2E4E'>

    • <optgroup id='16B8CA2E4E'><strike id='16B8CA2E4E'><sup id='16B8CA2E4E'></sup></strike><code id='16B8CA2E4E'></code></optgroup>
        1. <b id='16B8CA2E4E'><label id='16B8CA2E4E'><select id='16B8CA2E4E'><dt id='16B8CA2E4E'><span id='16B8CA2E4E'></span></dt></select></label></b><u id='16B8CA2E4E'></u>
          <i id='16B8CA2E4E'><strike id='16B8CA2E4E'><tt id='16B8CA2E4E'><pre id='16B8CA2E4E'></pre></tt></strike></i>

          entertainment

          entertainment

          author:entertainment    Page View:36171
          data thief
          Adobe

          In the last year, cyberattacks on hospitals have surged, putting a spotlight on the need to protect patients’ health data. But hackers don’t need to attack providers directly to get that valuable info. A new cybersecurity report shows it is remarkably easy for bad actors to steal it through third-party apps and data aggregators that tap into providers’ electronic health record systems.

          Hacker and cybersecurity analyst Alissa Knight got access to more than 4 million patient and clinician records by exploiting vulnerabilities in data aggregators’ application programming interfaces, along with associated apps that track medications and share patient records — records that include demographics, lab results, medications, procedures, allergies, and more. Collectively, the tested tools can read and write data to the major EHR systems.

          advertisement

          Knight initially set out looking for vulnerabilities in APIs built by the EHR companies themselves. Built on the open Fast Healthcare Interoperability Resources (FHIR) standard for health care data, those APIs are a powerful tool to unify data collected by different systems and support interoperability. “The EHR companies themselves have been partnering with me, allowing me access to their APIs” to conduct security testing, said Knight. But when she couldn’t find any soft spots in their systems, she began testing the FHIR APIs built by third-party data aggregators that interface with electronic health records, along with the gallery of apps that developers have built on those APIs.

          Unlock this article by subscribing to STAT+ and enjoy your first 30 days free!

          GET STARTED Log In

          explore

          New Eli Lilly Alzheimer’s data poses Medicare coverage conundrum
          New Eli Lilly Alzheimer’s data poses Medicare coverage conundrum

          CMSAdministratorChiquitaBrooks-LaSureChipSomodevilla/GettyImagesWASHINGTON— EliLilly’slatestanti-amy

          read more
          Public funding for King Charles III and royals has been recalculated due to windfarm deal profits
          Public funding for King Charles III and royals has been recalculated due to windfarm deal profits

          Britain'sKingCharlesIIIandQueenCamilla,hidden,withallamaduringavisittoTheatrBrycheinioginBrecon,Wale

          read more
          In age of alternative facts, a scholarly course on calling out crap
          In age of alternative facts, a scholarly course on calling out crap

          Screenshotviacallingbullshit.orgTiredofalternativefacts,fakenews,andbreathlesshyperbole,twoprofessor

          read more

          How digital therapeutics firms are pivoting after Pear's bankruptcy

          AdobeForyears,theplaybookformanycompaniesthatwantedtomarketdigitaltherapeuticswasstupidsimple:Sellit