Ladies and gentlemen, this is only the beginning. The research presented in this article presents just one of what is apt to become dozens of attack methodologies designed to leverage NFC-based transactions, with or without EMV (chip and pin) protections. IT Security professionals need to stay as far ahead of this curve as possible if we are going to salvage the trustworthiness of financial transactions in the US and abroad.
top of page
Recent Posts
See AllI recently spoke about the FTC’s lawsuit against Chegg, a major education tech firm, in one of the weekly tech tips interviews I provide...
Multiple sources have reported the breach of Cisco’s own network, purportedly via a Cisco employee’s personal Google account. According...
I very much enjoyed this article from Pieter Danhieux via Dark Reading and this creative approach to the management of applications and...
bottom of page