When we first saw [Chris Paget]’s cloning video, our reaction was pretty ‘meh’. We’d seen RFID cloning before and the Mifare crack was probably the last time RFID was actually interesting. His ...
Two RFID researchers created a video showing how an RFID reader attached to an improvised explosive device could theoretically identify a U.S. citizen walking past the reader and set off a bomb. They ...
Last month at the RSA Security `07 conference, a company called IOActive demonstrated an RFID cloner that can steal codes from building access cards. (IOActive was slated to show a similar ...
The wireless data transfer capabilities of radio frequency identification (RFID) tags are intended to speed and assist transactions, but it appears the RFID chips of new U.S. passports are speeding ...
An Arduino, a spent roll of toilet paper, magnet wire, and a few passive components are what’s needed to build this RFID spoofer. It’s quick, dirty, and best of all, simple. However, [SketchSk3tch’s] ...
ARLINGTON, Va. -- Black Hat DC -- A presentation that would have exposed potential vulnerabilities in RFID security technology has been pulled from tomorrow's Black Hat conference agenda following ...
Secure card maker HID is objecting to a demonstration of a hacking tool at this week’s Black Hat Federal security conference in Washington, D.C. that could make it easy to clone a wide range of ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results