Two RFID researchers created a video showing how an RFID reader attached to an improvised explosive device could theoretically identify a U.S. citizen walking past the reader and set off a bomb. They ...
An Arduino, a spent roll of toilet paper, magnet wire, and a few passive components are what’s needed to build this RFID spoofer. It’s quick, dirty, and best of all, simple. However, [SketchSk3tch’s] ...
It was demonstrated today at the BlackHat conference. Grunwald says it took him only two weeks to figure out how to clone the passport chip. Most of that time he spent reading the standards for ...
ARLINGTON, Va. -- Black Hat DC -- A presentation that would have exposed potential vulnerabilities in RFID security technology has been pulled from tomorrow's Black Hat conference agenda following ...
Secure card maker HID Corp. is objecting to a demonstration of a hacking tool at this week's Black Hat Federal security conference in Washington, D.C. that could make it easy to clone a wide range of ...
Forget keys, PINs, even biometrics. You want the future? Get a chip embedded in your arm. I mean, how is anybody going to steal that ? Wait, what? Pretty easily? Crap. Turns out cloning a VeriChip ...
The wireless data transfer capabilities of radio frequency identification (RFID) tags are intended to speed and assist transactions, but it appears the RFID chips of new U.S. passports are speeding ...
ARLINGTON, Va.--A security researcher on Wednesday delivered a redacted version of a presentation on RFID risks. The talk at the Black Hat DC conference here was cancelled on Tuesday and was to be ...