NFC or Near Field Communication technology is a set of protocols that can be used to establish communications between two devices when they are brought near to each other. It enables contactless communications using a radio frequency field and can operate within a range of around 4 cm. The two communicating devices usually involved include a stationary NFC reader and a portable NFC enabled smart card, mobile phone, wristband, etc. NFC has been widely used in payment cards, transportation cards, smart phones, mobile wallets, and as wristbands in the healthcare industry. It has especially become very popular for mobile payments and resulted in the growth of the FinTech industry. Information about NFC based credit cards can be stored in digital wallets and used to make payments at retail stores.
Since NFC cards can store and communicate data, there is no reason why should they be restricted to store credit card data. Using the same principles, NFC cards could be used to store any kind of personal or sensitive data. Also, with more and more people getting involved in the cryptocurrencies market, and some retailers already accepting them, there is a rising demand for NFC Cards that can be used to provide secure storage for crypto currencies. These cards can also be integrated with wallet applications to provide an easily accessible yet secure digital vault for....
Author
- Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
- LiveSeptember 5, 2024"40 Steps" Satellite Security - Registration for LIVE WORKSHOP IS NOW ON!
- LiveAugust 21, 2024"40 Steps" Game Hacking - Registration for LIVE WORKSHOP IS NOW ON!
- BlogDecember 13, 2022What are the Common Security Weaknesses of Cloud Based Networks?
- BlogOctober 12, 2022Vulnerability management with Wazuh open source XDR