Teardown: BlackBerry Smart Card Reader

Years before Steve Jobs showed off the first iPhone, the BlackBerry was already the must-have accessory for mobile professionals. Back then, nobody was worried about watching movies or playing the latest games on their mobile devices, they just wanted a secure and fast way to send and receive email on …read more

Continue reading Teardown: BlackBerry Smart Card Reader

Hackaday Podcast 070: Memory Bump, Strontium Rain, Sentient Solder Smoke, and Botting Browsers

Hackaday editors Elliot Williams and Mike Szczys bubble sort a sample set of amazing hacks from the past week. Who has even used the smart chip from an old credit card as a functional component in their own circuit? This guy. There’s something scientifically devious about the way solder smoke …read more

Continue reading Hackaday Podcast 070: Memory Bump, Strontium Rain, Sentient Solder Smoke, and Botting Browsers

Significant trends are beginning to develop in the Government ID market

The worldwide installed base of both smart and legacy credentials will grow from 9.8 billion in 2018 to 11.5 billion in 2023, according to ABI Research. With increased rates of international travel and government focus shifting to border control and se… Continue reading Significant trends are beginning to develop in the Government ID market

Vulnerabilities in smart card drivers open systems to attackers

Security researcher Eric Sesterhenn of X41 D-SEC GmbH has unearthed a number of vulnerabilities in several smart card drivers, some of which can allow attackers to log into the target system without valid credentials and achieve root/admin privileges. … Continue reading Vulnerabilities in smart card drivers open systems to attackers

How the access control market has developed and should direct itself in the coming years

Smart cards have become synonymous with the access control market, continuing to be used across a variety of end markets including, healthcare, warehousing and storage, education, lodging, and mercantile and office spaces. Smart cards remain the predom… Continue reading How the access control market has developed and should direct itself in the coming years

Credential Phishing – Easy Steps to Stymie Hackers

Phishing attacks have become a common factor in our daily routines for businesses and in our personal lives. There are many different types of phishing attacks, each of which requires a slightly different defense while having some commonalities as well… Continue reading Credential Phishing – Easy Steps to Stymie Hackers

Estonia blocks certificates on 760,000 ID cards due to identity theft risk

On 3 November 2017 at midnight, Estonia will block the certificates of 760,000 ID cards. The decision is the result of the discovery of a security vulnerability in the Infineon-developed RSA library, which could be exploited by attackers to discover the RSA private key corresponding to an RSA public key generated by this library. Estonian electronic ID cards have been manufactured by the Swiss company Trub AG and its successor Gemalto AG since 2001. The … More Continue reading Estonia blocks certificates on 760,000 ID cards due to identity theft risk

Unlocking Windows 10 PCs with smartphones, wearables, smart cards

With Windows 10, Microsoft is slowly moving towards removing passwords as the main authentication method for users to log in to their (locked) computers. Windows Hello, the password-free authentication feature that comes with the OS, works by recognizing the users’ face, iris, or fingerprint, but could initially be used only by those that had a supported infrared-illuminated camera (for face and iris recognition), a supported fingerprint reader, or companion devices such as Microsoft Band and … More Continue reading Unlocking Windows 10 PCs with smartphones, wearables, smart cards