{"id":633,"date":"2008-03-16T01:40:15","date_gmt":"2008-03-16T01:40:15","guid":{"rendered":"tag:www.hothardware.com:\/\/db85c2830d37ca304894705de47ecc42"},"modified":"2008-03-16T01:40:15","modified_gmt":"2008-03-16T01:40:15","slug":"pacemakers-the-latest-hacking-target","status":"publish","type":"post","link":"https:\/\/computerhunter.us\/?p=633","title":{"rendered":"Pacemakers the Latest Hacking Target"},"content":{"rendered":"<p>A report, to be presented at a California computer-security conference in May, suggests that pacemakers and defibrillators may be targets for hacking.Millions of Americans have pacemakers, which keeps hearts beating regularly, or an implanted defibrillator, which can restart stopped hearts with an electric jolt. After implanting a defibrillator under a patient&#8217;s skin, a doctor uses a special device, about the size of a breadbox, to tell the defibrillator what to do &#8212; for example, to instruct it to keep the<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A report, to be presented at a California computer-security conference in May, suggests that pacemakers and defibrillators may be targets for hacking.Millions of Americans have pacemakers, which keeps hearts beating regularly, or an implanted defibrillator, which can restart stopped hearts with an electric jolt. After implanting a defibrillator under a patient&#8217;s skin, a doctor uses a special device, about the size of a breadbox, to tell the defibrillator what to do &#8212; for example, to instruct it to keep the <a href=\"https:\/\/computerhunter.us\/?p=633\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":37,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-633","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/posts\/633","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/users\/37"}],"replies":[{"embeddable":true,"href":"https:\/\/computerhunter.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=633"}],"version-history":[{"count":0,"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/posts\/633\/revisions"}],"wp:attachment":[{"href":"https:\/\/computerhunter.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=633"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/computerhunter.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=633"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/computerhunter.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=633"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}