{"id":91835,"date":"2018-10-09T08:00:18","date_gmt":"2018-10-09T15:00:18","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=91835"},"modified":"2025-06-08T19:52:26","modified_gmt":"2025-06-09T02:52:26","slug":"when-the-digital-impacts-the-physical","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/when-the-digital-impacts-the-physical\/","title":{"rendered":"When the Digital Impacts the Physical"},"content":{"rendered":"<p>Cyberattacks have always been, well, cyber. Their immediate effects were on our data, our digital information, and our devices\u2026until they weren\u2019t. The interconnected nature of the world and the way it\u2019s built in 2018 has brought us exciting and revolutionary innovations, but it has also been leveraged by hackers to extend the impact of a cyberattack beyond the digital sphere into the physical. Pacemakers\u00a0can be hacked, shocks can be sent to patients remotely. Critical infrastructure can be\u00a0<a href=\"https:\/\/www.wired.com\/2016\/03\/inside-cunning-unprecedented-hack-ukraines-power-grid\/\" target=\"_blank\" rel=\"noopener\">taken down<\/a>, rendering cities powerless. Large corporations we trust with our data are violating that trust by collecting our data unknowingly, and even tracking our locations without consent. Cybercrime is no longer just cyber, and it can compromise a lot more than just data.<\/p>\n<p>When you think of one\u2019s well-being, physical health often comes to mind. Hospitals, health care, and medical tools and devices have evolved to become members of an interconnected ecosystem. Many health care systems connect to the internet to operate, the same holds true with numerous medical devices such as pacemakers. But that makes the latter part of the \u201dInternet of Things,\u201d a growing collection of connected devices which are potentially vulnerable to cyberattack. In fact, there have already been reports of threats to these medical devices. <a href=\"https:\/\/thehackernews.com\/2017\/08\/pacemakers-hacking.html\" target=\"_blank\" rel=\"noopener\">Just last year<\/a>, the FBI recalled half a million pacemakers, as a crucial flaw was discovered that could expose users to an attack. Additionally, security researchers <a href=\"https:\/\/www.wired.com\/story\/pacemaker-hack-malware-black-hat\/\" target=\"_blank\" rel=\"noopener\">recently revealed<\/a> a chain of vulnerabilities in a particular pacemaker brand that an attacker could exploit to control implanted pacemakers remotely and cause physical harm to patients.<\/p>\n<p>Cybercriminals have also set their sights on larger targets when it comes to hacking health care devices and institutions. We\u2019ve seen a handful of hospitals taken offline in <a href=\"https:\/\/healthitsecurity.com\/news\/cybercriminals-target-hospitals-with-samsam-ransomware-attacks\" target=\"_blank\" rel=\"noopener\">recent ransomware attacks<\/a>, all due to the use of outdated or vulnerable systems. Some of these attacks locked patient data and made proper care unachievable for hours on end.<\/p>\n<p>Hospitals are also not the only type of critical infrastructure that\u2019s been on the victim\u2019s end of a cyberattack. In fact, cybercriminals have recently begun hitting critical infrastructure hard and fast, with dramatic results emerging from their efforts. They\u2019ve infamously put an entire city in the Ukraine <a href=\"https:\/\/www.wired.com\/story\/crash-override-malware\/\" target=\"_blank\" rel=\"noopener\">out of power<\/a> for about an hour. Then there was the <a href=\"https:\/\/www.wired.com\/story\/triton-malware-dangers-industrial-system-sabotage\/\" target=\"_blank\" rel=\"noopener\">Schneider Electric hack<\/a><u>,<\/u> in which cybercriminals leveraged a zero-day vulnerability within an industrial plant\u2019s safety system for a cyberattack.<\/p>\n<p>There are also cyber issues that impact our physical safety that don\u2019t even come in the form of an attack. Lately, news has been circulating about big-name companies tracking users\u2019 locations or data, even when certain settings are off or when the user is unaware of the action. Specifically, <a href=\"https:\/\/www.wired.com\/story\/google-location-tracking-turn-off\/\" target=\"_blank\" rel=\"noopener\">it was discovered<\/a> that even if a user disables Location History, Google still tracks users in particular instances \u2014 whenever they open up the Maps app, scan the internet for certain things, or receive automatic weather notifications. Even smartwatches have been used recently to <a href=\"https:\/\/www.dailymail.co.uk\/sciencetech\/article-4991102\/Is-stranger-hacking-child-s-smart-watch.html\" target=\"_blank\" rel=\"noopener\">record and track kids\u2019 physical location<\/a>.<\/p>\n<p>Ramifications such as these have changed the nature of privacy, as well as digital and physical safety as we know it. But as the threat landscape is evolving, so is the industry determined to protect innocent users everywhere.<\/p>\n<p>We at McAfee are working together with our entire industry to stop these types of attacks. We\u2019re sharing threat intelligence, resources, and research findings to ensure we put up a united front against these threats. By learning from these attacks, we\u2019re better preparing for those to come.<\/p>\n<p>We believe that together is power. And though these attacks are advanced, we know that acting together to stop them will be even more powerful.<\/p>\n<h2>Learn more<\/h2>\n<p>To learn more about McAfee\u2019s approach to protecting against advanced cyberattacks and more, be sure to check us out at <a href=\"https:\/\/twitter.com\/McAfee\" target=\"_blank\" rel=\"noopener\">@McAfee<\/a>\u00a0and <a href=\"https:\/\/twitter.com\/McAfee_Labs\" target=\"_blank\" rel=\"noopener\">@McAfee_Labs<\/a>.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyberattacks have always been, well, cyber. Their immediate effects were on our data, our digital information, and our devices\u2026until they&#8230;<\/p>\n","protected":false},"author":1004,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[5526],"coauthors":[5354],"class_list":["post-91835","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-advanced-threat-research"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>When the Digital Impacts the Physical | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Cyberattacks have always been, well, cyber. Their immediate effects were on our data, our digital information, and our devices\u2026until they weren\u2019t. The\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"When the Digital Impacts the Physical | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Cyberattacks have always been, well, cyber. Their immediate effects were on our data, our digital information, and our devices\u2026until they weren\u2019t. The\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/when-the-digital-impacts-the-physical\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-09T15:00:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-09T02:52:26+00:00\" \/>\n<meta name=\"author\" content=\"Steve Povolny\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@spovolny\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steve Povolny\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/when-the-digital-impacts-the-physical\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/when-the-digital-impacts-the-physical\/\"},\"author\":{\"name\":\"Steve Povolny\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/210ec6c1c7e372f17c4b1109f06b8267\"},\"headline\":\"When the Digital Impacts the Physical\",\"datePublished\":\"2018-10-09T15:00:18+00:00\",\"dateModified\":\"2025-06-09T02:52:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/when-the-digital-impacts-the-physical\/\"},\"wordCount\":648,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"keywords\":[\"Advanced Threat Research\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/when-the-digital-impacts-the-physical\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/when-the-digital-impacts-the-physical\/\",\"name\":\"When the Digital Impacts the Physical | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"datePublished\":\"2018-10-09T15:00:18+00:00\",\"dateModified\":\"2025-06-09T02:52:26+00:00\",\"description\":\"Cyberattacks have always been, well, cyber. Their immediate effects were on our data, our digital information, and our devices\u2026until they weren\u2019t. The\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/when-the-digital-impacts-the-physical\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/when-the-digital-impacts-the-physical\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/when-the-digital-impacts-the-physical\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"When the Digital Impacts the Physical\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/210ec6c1c7e372f17c4b1109f06b8267\",\"name\":\"Steve Povolny\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/d83e09f6a46193cbf6406c6f30ba3fde\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/steve_p_mcafee-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/steve_p_mcafee-96x96.png\",\"caption\":\"Steve Povolny\"},\"description\":\"Steve Povolny is the Head of Advanced Threat Research for McAfee Enterprise, which delivers groundbreaking vulnerability research spanning nearly every industry. With more than a decade of experience in network security, Steve is a recognized authority on hardware and software vulnerabilities, and regularly collaborates with influencers in academia, government, law enforcement, consumers and enterprise businesses of all sizes. Steve is a sought after public speaker and media commentator who often blogs on key topics. He brings his passion for threat research and a unique vision to harness the power of collaboration between the research community and product vendors, through responsible disclosure, for the benefit of all.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/steve-povolny-595a776\/\",\"https:\/\/x.com\/spovolny\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/steve-povolny\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"When the Digital Impacts the Physical | McAfee Blog","description":"Cyberattacks have always been, well, cyber. Their immediate effects were on our data, our digital information, and our devices\u2026until they weren\u2019t. The","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"When the Digital Impacts the Physical | McAfee Blog","og_description":"Cyberattacks have always been, well, cyber. Their immediate effects were on our data, our digital information, and our devices\u2026until they weren\u2019t. The","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/when-the-digital-impacts-the-physical\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2018-10-09T15:00:18+00:00","article_modified_time":"2025-06-09T02:52:26+00:00","author":"Steve Povolny","twitter_card":"summary_large_image","twitter_creator":"@spovolny","twitter_site":"@McAfee","twitter_misc":{"Written by":"Steve Povolny","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/when-the-digital-impacts-the-physical\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/when-the-digital-impacts-the-physical\/"},"author":{"name":"Steve Povolny","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/210ec6c1c7e372f17c4b1109f06b8267"},"headline":"When the Digital Impacts the Physical","datePublished":"2018-10-09T15:00:18+00:00","dateModified":"2025-06-09T02:52:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/when-the-digital-impacts-the-physical\/"},"wordCount":648,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"keywords":["Advanced Threat Research"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/when-the-digital-impacts-the-physical\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/when-the-digital-impacts-the-physical\/","name":"When the Digital Impacts the Physical | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"datePublished":"2018-10-09T15:00:18+00:00","dateModified":"2025-06-09T02:52:26+00:00","description":"Cyberattacks have always been, well, cyber. Their immediate effects were on our data, our digital information, and our devices\u2026until they weren\u2019t. The","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/when-the-digital-impacts-the-physical\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/when-the-digital-impacts-the-physical\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/when-the-digital-impacts-the-physical\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"When the Digital Impacts the Physical"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/210ec6c1c7e372f17c4b1109f06b8267","name":"Steve Povolny","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/d83e09f6a46193cbf6406c6f30ba3fde","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/steve_p_mcafee-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/steve_p_mcafee-96x96.png","caption":"Steve Povolny"},"description":"Steve Povolny is the Head of Advanced Threat Research for McAfee Enterprise, which delivers groundbreaking vulnerability research spanning nearly every industry. With more than a decade of experience in network security, Steve is a recognized authority on hardware and software vulnerabilities, and regularly collaborates with influencers in academia, government, law enforcement, consumers and enterprise businesses of all sizes. Steve is a sought after public speaker and media commentator who often blogs on key topics. He brings his passion for threat research and a unique vision to harness the power of collaboration between the research community and product vendors, through responsible disclosure, for the benefit of all.","sameAs":["https:\/\/www.linkedin.com\/in\/steve-povolny-595a776\/","https:\/\/x.com\/spovolny"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/steve-povolny\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/91835","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1004"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=91835"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/91835\/revisions"}],"predecessor-version":[{"id":215291,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/91835\/revisions\/215291"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=91835"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=91835"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=91835"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=91835"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}