This document discusses security vulnerabilities in implantable medical devices like pacemakers and defibrillators. Researchers were able to reverse engineer the communication protocols and perform attacks like changing settings and inducing fibrillation using inexpensive software-defined radios. To prevent such attacks, the researchers proposed zero-power defenses that do not rely on the device's battery, including using harvested RF energy to power notifications via sound or authenticate requests cryptographically. Evaluation showed these defenses could work using existing hardware without harming patients. Future work is needed to ensure security even with emergency access or advanced networked devices.