PaymentsJournal
No Result
View All Result
SIGN UP
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
PaymentsJournal
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
No Result
View All Result
PaymentsJournal
No Result
View All Result

NFC Gets the Hacker Treatment

By Mercator Advisory Group
July 30, 2012
in Analysts Coverage
0
0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn
Sport woman hand tying shoelaces wearing touchscreen smartwatch with health sensor app icon on forest trail background

Sport woman hand tying shoelaces wearing touchscreen smartwatch with health sensor app icon on forest trail background

At last week’s DEF CON hacker conference, the short range communications technique called NFC (near field communications) is taking its turn in the hot seat. The attention is shining a bright light on this smartphone-based system, on weaknesses due to bug-ridden software as well as insecure default behavior. The news isn’t good.

The dominant smartphone operating system is Android. Android introduced Android Beam a year ago as a means to share web pages, business cards, URLs to videos, and more. The initial software release supporting NFC functions has a number of weaknesses as discovered by the hacker Charlie Miller whose research identified the concerns. While many of the bugs have been fixed in current releases of Android and Nokia phones, it can take many months for those updates to distributed to eligible smartphones.

Of more concern is the default behavior of Android Beam, NFC and how it interacts, by default, with other NFC devices, even $1 NFC tags that can be programmed to suborn the smartphone of the unwary and unwitting.

From an Arstechnica article:

But even if there are no exploitable bugs in the NFC code itself, a feature known as Android Beam, which Google developers added to Ice Cream Sandwich, allows Miller to force a handset browser to open and visit any website he chooses—without first getting permission of the end user.

“What that means is with an NFC tag, if I walk up to your phone and touch it, or I just get near it, your Web browser, without you doing anything, will open up and go to a page that I tell it to,” Miller said. “So instead of the attack surface being the NFC stack, the attack surface really is the whole Web browser and everything a Web browser can do. I can reach that through NFC.”

Surprisingly, when NFC and Android Beam are enabled—as they are by default—devices will automatically download any file or Web link sent through the service. There’s no way for end users to selectively approve or reject a specific transfer initiated by another handset. “The fact that, without you doing anything, all of a sudden your browser is going to my website, is not ideal,” Miller said in a noted understatement.

Identifying software and hardware security vulnerabilities is one of the huge benefits of conferences like DEF CON. For general purpose technologies like NFC, in particular, exposure to real world examination is essential to improving the overall security profile of the system. Finding flaws does not mean an approach is irremediably broken. It’s only broken if the flaws aren’t fixed.

Click here to read more from Arstechnica.

0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn
Tags: Fraud Risk and Analytics

    Get the Latest News and Insights Delivered Daily

    Subscribe to the PaymentsJournal Newsletter for exclusive insight and data from Javelin Strategy & Research analysts and industry professionals.

    Must Reads

    cross-border payments

    Solving for Fraud in Cross-Border Payments Requires Better Counterparty Verification

    February 12, 2026
    agentic commerce

    Demystifying the Agentic Commerce Enigma

    February 11, 2026
    payment gateways

    How Payment Gateways for Businesses Can Help You Offer Your Customers More Options

    February 10, 2026
    Reserve Bank of India (RBI) Extends Mandate for Tokenization to June '22

    Late Payments? Governments Are Taking Action

    February 9, 2026
    ai phishing

    The Fraud Epidemic Is Testing the Limits of Cybersecurity

    February 6, 2026
    stablecoins b2b payments

    Stablecoins and the Future of B2B Payments: Faster, Cheaper, Better

    February 5, 2026
    Payment Facilitator

    The Payment Facilitator Model as a Growth Strategy for ISVs

    February 4, 2026
    Simplifying Payment Processing? Payment Orchestration Can Help , multi-acquiring merchants

    Multi-Acquiring Is the New Standard—Are Merchants Ready?

    February 3, 2026

    Linkedin-in X-twitter
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter

    ©2024 PaymentsJournal.com |  Terms of Use | Privacy Policy

    • Commercial Payments
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    No Result
    View All Result