Android phones can now be security keys for iOS devices
Hey, iOS users. Got a spare Android phone lying around? Now, you can use it as a secure access key for online services. Continue reading Android phones can now be security keys for iOS devices
Collaborate Disseminate
Hey, iOS users. Got a spare Android phone lying around? Now, you can use it as a secure access key for online services. Continue reading Android phones can now be security keys for iOS devices
Researchers have demonstrated a new vulnerability in NFC, a feature built-in to many smartphones sold today. The vulnerability allows the attacker to to generate ‘ghost taps’ against a device, effectively allowing an attacker to tap your phone without you looking.
The 18-page paper released by a team of three researchers …read more
Continue reading Tap ‘N Ghost: A Novel Attack Against Smartphone Touchscreens
Although the best-before dates on our foods may stop us from eating spoiled items, they can also cause us to toss out food that’s really still good. New phone-powered labels could help, by notifying users when the food is actually starting to… Continue reading Smartphone-activated food labels may replace best-before dates
Researchers use malicious NFC tags and booby-trapped physical surfaces to connect Android devices to malicious wireless networks. Continue reading Tap ‘n Ghost Attack Creatively Targets Android Devices
NFC locks are reaching a tipping point where the technology is so inexpensive that it makes sense to use it in projects where it would have been impractical months ago. Not that practicality has any place among these pages. IKEA carries a cabinet lock for $20USD and does not need …read more
Are there any NDEF message smuggling attacks (like http smuggling attack)?
When I say it, I mean that I have a full control on the NFC packet. Is it possible to inject another packet into a NFC payload or something.
My Google Titan security key has both USB and NFC interfaces, and I’m able to use it via NFC on my Android phone. However, my laptop also has an NFC reader, and it doesn’t seem to work out of the box. The laptop makes NFC noi… Continue reading Is there any way to use my Titan security key via NFC on my laptop, instead of USB? [migrated]
We use EMV card readers to automate the payments at the entry and exit to our services. These card readers and the unattended payment terminals are fully PTS complaint and use P2PE encryption. Also, implemented by PCI-DSS com… Continue reading PCI-DSS scope: Using P2PE Compliant devices
Fraud investigators say they’ve uncovered a sophisticated new breed of credit card skimmers being installed at gas pumps that is capable of relaying stolen card data via mobile text message, thereby enabling fraudsters to collect it from anywhere in the world. One interesting component of this criminal innovation is a small cellphone and Bluetooth-enabled device hidden inside the contactless payment terminal of the pump, which appears to act as a Bluetooth hub that wirelessly gathers card data from multiple compromised pumps at a given filling station. Continue reading New Breed of Fuel Pump Skimmer Uses SMS and Bluetooth
I’ve been trying to experiment with cloning NFC cards as part of an experiment. I’ve successfully got to the point where I’ve got a dump of both cards (done with Mifare Classic Tool).
After the ‘write’ to the clone card, the… Continue reading Cloning NFC card failed – dump looks identical