Ever hear of the Phoniebox project? If not – tune in, that’s a hacker’s project your entire family will appreciate. Phoniebox is a software suite and tutorial for building a jukebox controlled through ...
Just a few decades ago, buying things meant going to the bank — your own physical branch, mind you, during the brief hours it was open — to take out cash. If you didn’t have time for that, or ran out ...
It’s been known for some time that there are security issues associated with the increasing use of RFID tags in credit cards, but this past weekend afforded a fresh demonstration of just how easy it ...
Thieves are always looking for high-tech ways to steal your info, but RFID-blocking wallets don't have to look boring.
In this episode of eSpeaks, Jennifer Margles, Director of Product Management at BMC Software, discusses the transition from traditional job scheduling to the era of the autonomous enterprise. eSpeaks’ ...
As contactless payment adoption accelerates globally, cybersecurity researchers report a measurable increase in RFID skimming incidents targeting credit cards, electronic passports, and identification ...
The security of an RFID system, as with almost any payment or information technology system, depends on how it is set up. If a transit company is issuing transponders with unique serial numbers and ...