Are you able to get into your office by simply bumping your purse or wallet against a reader? Then your office is using radio-frequency identification cards, or RFID cards, to manage building access ...
The security of an RFID system, as with almost any payment or information technology system, depends on how it is set up. If a transit company is issuing transponders with unique serial numbers and ...
I wore the world's first HDR10 smart glasses TCL's new E Ink tablet beats the Remarkable and Kindle Anker's new charger is one of the most unique I've ever seen Best laptop cooling pads Best flip ...
This article was originally published by RFID Update. March 14, 2008—In what has become a twice-annual event, this week saw yet another very public assertion of vulnerability in the security of RFID.
It was demonstrated today at the BlackHat conference. Grunwald says it took him only two weeks to figure out how to clone the passport chip. Most of that time he spent reading the standards for ...
Despite demonstrations to show it's possible, documented cases of RFID credit card fraud are unknown. And as security professionals know, there is a huge gulf between potential crime and actual crime.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results