PaymentsJournal
SUBSCRIBE
  • Analysts Coverage
  • Truth In Data
  • Podcasts
  • Videos
  • Industry Opinions
  • News
  • Resources
No Result
View All Result
PaymentsJournal
  • Analysts Coverage
  • Truth In Data
  • Podcasts
  • Videos
  • Industry Opinions
  • News
  • Resources
No Result
View All Result
PaymentsJournal
No Result
View All Result

NFC Gets the Hacker Treatment

Mercator Advisory Group by Mercator Advisory Group
July 30, 2012
in Analysts Coverage
0

Sport woman hand tying shoelaces wearing touchscreen smartwatch with health sensor app icon on forest trail background

0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn

At last week’s DEF CON hacker conference, the short range communications technique called NFC (near field communications) is taking its turn in the hot seat. The attention is shining a bright light on this smartphone-based system, on weaknesses due to bug-ridden software as well as insecure default behavior. The news isn’t good.

The dominant smartphone operating system is Android. Android introduced Android Beam a year ago as a means to share web pages, business cards, URLs to videos, and more. The initial software release supporting NFC functions has a number of weaknesses as discovered by the hacker Charlie Miller whose research identified the concerns. While many of the bugs have been fixed in current releases of Android and Nokia phones, it can take many months for those updates to distributed to eligible smartphones.

Of more concern is the default behavior of Android Beam, NFC and how it interacts, by default, with other NFC devices, even $1 NFC tags that can be programmed to suborn the smartphone of the unwary and unwitting.

From an Arstechnica article:

But even if there are no exploitable bugs in the NFC code itself, a feature known as Android Beam, which Google developers added to Ice Cream Sandwich, allows Miller to force a handset browser to open and visit any website he chooses—without first getting permission of the end user.

“What that means is with an NFC tag, if I walk up to your phone and touch it, or I just get near it, your Web browser, without you doing anything, will open up and go to a page that I tell it to,” Miller said. “So instead of the attack surface being the NFC stack, the attack surface really is the whole Web browser and everything a Web browser can do. I can reach that through NFC.”

Surprisingly, when NFC and Android Beam are enabled—as they are by default—devices will automatically download any file or Web link sent through the service. There’s no way for end users to selectively approve or reject a specific transfer initiated by another handset. “The fact that, without you doing anything, all of a sudden your browser is going to my website, is not ideal,” Miller said in a noted understatement.

Identifying software and hardware security vulnerabilities is one of the huge benefits of conferences like DEF CON. For general purpose technologies like NFC, in particular, exposure to real world examination is essential to improving the overall security profile of the system. Finding flaws does not mean an approach is irremediably broken. It’s only broken if the flaws aren’t fixed.

Click here to read more from Arstechnica.

Tags: Fraud Risk and Analytics
0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn

    Analyst Coverage, Payments Data, and News Delivered Daily

    Sign up for the PaymentsJournal Newsletter to get exclusive insight and data from Mercator Advisory Group analysts and industry professionals.

    Must Reads

    eCommerce On Social Media, social commerce

    The Rise of Social Commerce and Social Payments

    February 3, 2023
    Electroneum AnyTask; ETN Crypto, sales enablement

    Ethical Financial Selling: The Role of Compliance Technology and Sales Enablement

    February 2, 2023
    direct deposit

    Nacha Launches Campaign to Reach Millennials on the Benefits of Direct Deposit

    February 1, 2023
    Equinix Helps UK-Based Payments Provider Enable Faster, More Reliable Payments Processing

    Equinix Helps UK-Based Payments Provider Enable Faster, More Reliable Payments Processing

    January 31, 2023
    credit card tumbling

    How to Detect, and Prevent, Credit Card Tumbling

    January 30, 2023
    Why Businesses Need to Adopt Real-Time Payments as a Competitive Differentiator

    Why Businesses Need to Adopt Real-Time Payments as a Competitive Differentiator

    January 27, 2023
    faster payments

    Faster Payments Are Set to Revolutionize Modern Digital Payments

    January 26, 2023
    How AI can Help Manage Payments Risk in 2023

    How AI can Help Manage Payments Risk in 2023

    January 25, 2023

    • Advertise With Us
    • About Us
    • Terms of Use
    • Privacy Policy
    • Subscribe
    ADVERTISEMENT
    • Analysts Coverage
    • Truth In Data
    • Podcasts
    • Videos
    • Industry Opinions
    • News
    • Resources

    © 2022 PaymentsJournal.com

    • Analysts Coverage
    • Truth In Data
    • Podcasts
    • Industry Opinions
    • Faster Payments
    • News
    • Jobs
    • Events
    No Result
    View All Result

      Register to download the Equinix report - Dojo Delivers Fast, Reliable and Secure Card Payments to Businesses on Platform Equinix