• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Stellantis probes data breach linked to third-party provider

 | 

FBI alerts public to spoofed IC3 site used in fraud schemes

 | 

EU agency ENISA says ransomware attack behind airport disruptions

 | 

Researchers expose MalTerminal, an LLM-enabled malware pioneer

 | 

Beware: GitHub repos distributing Atomic Infostealer on macOS

 | 

ESET uncovers Gamaredon–Turla collaboration in Ukraine cyberattacks

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 63

 | 

Security Affairs newsletter Round 542 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

A cyberattack on Collins Aerospace disrupted operations at major European airports

 | 

Fortra addressed a maximum severity flaw in GoAnywhere MFT software

 | 

UK police arrested two teen Scattered Spider members linked to the 2024 attack on Transport for London

 | 

ShadowLeak: Radware Uncovers Zero-Click Attack on ChatGPT

 | 

SonicWall warns customers to reset credentials after MySonicWall backups were exposed

 | 

CVE-2025-10585 is the sixth actively exploited Chrome zero-day patched by Google in 2025

 | 

Jaguar Land Rover will extend its production halt into a third week following a cyberattack

 | 

China-linked APT41 targets government, think tanks, and academics tied to US-China trade and policy

 | 

Microsoft and Cloudflare teamed up to dismantle the RaccoonO365 phishing service

 | 

DoJ resentenced former BreachForums admin to three years in prison

 | 

Apple backports fix for actively exploited CVE-2025-43300

 | 

New supply chain attack hits npm registry, compromising 40+ packages

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Hacking
  • Security
  • slider
  • Is Bio hacking a security risk? The future is now!

Is Bio hacking a security risk? The future is now!

Pierluigi Paganini February 18, 2015

Bio hacking – technology and humans have never been so close, they complement each other. But what are the security and privacy risks?

IS BIOHACKING A SECURITY RISK?

Imagine a world where our day to day activities like door locking, supermarket purchases, credit card swipes and smartphone usage are replaced by just one chip embedded under your skin. We are upgrading the human bodies to meet the technological needs. The future is expected to be completely technology dependent with very little human interruptions. Humans have been implanting technologies in their bodies for medical reasons like the adoption of implantable aids such as pacemakers, insulin pumps, deep brain stimulation system, the world is already filling with humans who could be considered part machines.

BioHacking

A practice of engaging biology with the hacker ethics. It is a wide spectrum of practices and movements ranging from designing and installing Do-It-Yourself body-enhancements such as chip implants. The term applies to any advanced technique that uses science and technology to improve human output and performance. To many, biohacking is a highly radical, unregulated science.

Early Experiments in BioHacking:

Kevin Warwick, Deputy Vice-Chancellor University(Research) at Coventry University, UK, conducted multiple experiments on himself. In 1998, he implanted a chip into his forearm to communicate with a computer programmed to respond to his actions. By tracking his movement through the halls and offices where he conducted research, the computer could turn on lights or opens doors for him.

bio hacking 2

To explain how a machine could interpret what the body wants to do, Warwick likened the nerve signals to a telephone line. An implanted chip wouldn’t hinder any nerve impulses from the brain to a body part’s muscles and tendons; it would just tap into the signals being sent and received.

In 2002, Warwick went much further. He implanted an electrode that transmitted nerve signals to robot arms. By moving his hand in New York, he could use an Internet connection to watch a robot replicate his movements in the UK. Warwick also installed a matching implant into his wife’s nervous system.

By connecting neurally to his wife, the couple accurately identified each other’s nerve signals about 98 percent of the time. For example, if his wife moved her hand, Warwick could feel a sensation down his left index finger.

“It didn’t feel like pain or heat or seeing. It was like an entirely new sense. And that was part of the experiment: to see if the brain can adapt and take on new types of input and learn to understand,”Warwick said.

Future of Bio Hacking

  • Smart implants will be used for Identification and Authentication of individuals, tasks and services.
  • Identification will include activities like accessing buildings, activating mobile devices, controlling room temperature.
  • Smart implant Authentication can be used for authenticating a bank transaction, part of a two factor authentication replacing smartphone PIN codes, activity logging and health monitoring.

BioNyfiken, a bio hacking group based in Stockholm, Sweden, is a breeding ground for advancement in the field of biohacking. While it began with a small group of people willing to experiment with everything from “biology to cells to plants to Homo sapiens”, in the last few months, over 300 people in the country have now volunteered to have NFC chips embedded in the skin between thumb and forefinger in their hands. This NFC chip has the capability to replace house keys, business card and bike lock.

Check out the below video on RFID chip

Privacy problems:

Connecting our bodies to the internet might pose a major security risk. Security firm like Kaspersky Labs has teamed up with BioNyfiken to uncover the risks involved in biohacking.

Patrick Mylund Nielsen, Senior Security Researcher at Kaspersky says

“The trend with Internet of Things has been to create products and get them to market fast. Security is often an afterthought. What happens when our private keys are under our skin? Can somebody become a virtual copy of me by shaking my hand?”

Is Bio hacking Secure?

For now, there’s no clear way to regulate bio hacking. Legislators have paid little attention to regulating individuals, though the FBI is wary. It has encouraged biohackers to create a neighborhood watch-type program so that the biohacker community can spot misuse. Since biohacking is a relatively new field, that’s all the more reason to establish a precedent for how it is monitored within the traditionally unregulated environment from which it was borne.

In addition to legal concerns, biohacking has some security issues that need to be considered, too. Implant technology has a well-established role in the medical field, but the medical industry faces vulnerability from lack of cyber security practices among medical device makers and health-care facilities.

The emergence of the Internet of Things will play a major role in Cyber Security for the year 2015. RFID or NFC implantable chips should be extensively tested for Security and vulnerability related risks before introducing it to the market.

Weak vendor passwords, out-of-date software, poorly-protected Internet connections, and untested patches by vendors would make it easy for a hacker to plug into a hospital network and attack vulnerable systems. If a hospital’s network or software security is compromised, life-saving technology could become life-threatening.

One of the main issues is that these devices use web services to communicate with each other and feed data directly to patient’s medical records. A lot of web services are unauthenticated or unencrypted between devices, so a hacker could alter the information that gets fed into the medical record, said Scott Erven, head of information security at Essentia Health. Since physicians are taught to rely on information found in medical records, they might misdiagnose a patient or administer the wrong prescriptions.

About the Author Ashiq JA (@AshiqJA)
Ashiq JA (Mohamed Ashik) is a Cyber Security Researcher and Writer passionate about Web Application Security, Security research using Machine Learning and Big Data, Deep web, Security technologies and Threat Analysis. He is currently working as a Security Consultant for a financial firm. He believes in knowledge sharing as the best source for information security  awareness. To catch up with the latest news on InfoSec trends, Follow Ashiq JA on Twitter @AshiqJA.

Edited by Pierluigi Paganini

(Security Affairs –  Bio hacking, IoT)


facebook linkedin twitter

bio hacking brain hacking implanting technologies Internet of Things IoT NFC NFC chip Pierluigi Paganini RFID Security Affairs

you might also like

Pierluigi Paganini September 22, 2025
Stellantis probes data breach linked to third-party provider
Read more
Pierluigi Paganini September 22, 2025
FBI alerts public to spoofed IC3 site used in fraud schemes
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Stellantis probes data breach linked to third-party provider

    Data Breach / September 22, 2025

    FBI alerts public to spoofed IC3 site used in fraud schemes

    Cyber Crime / September 22, 2025

    EU agency ENISA says ransomware attack behind airport disruptions

    Security / September 22, 2025

    Researchers expose MalTerminal, an LLM-enabled malware pioneer

    Malware / September 22, 2025

    Beware: GitHub repos distributing Atomic Infostealer on macOS

    Malware / September 22, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT