top of page

New Potential Attack / Theft Vector for Contactless Payments

Ladies and gentlemen, this is only the beginning.  The research presented in this article presents just one of what is apt to become dozens of attack methodologies designed to leverage NFC-based transactions, with or without EMV (chip and pin) protections.  IT Security professionals need to stay as far ahead of this curve as possible if we are going to salvage the trustworthiness of financial transactions in the US and abroad.

1 view

Recent Posts

See All

Rethinking Software in the Organizational Hierarchy

I very much enjoyed this article from Pieter Danhieux via Dark Reading and this creative approach to the management of applications and hierarchical security. The concept of least privilege and the d


bottom of page