Monday, January 11, 2010
Smart Card White Hats are Successful Again
Karsten Nohl and Henryk Plötz, the team of researchers who initially pointed out security flaws in several early 13.56 smart cards, are once again proving their mettle by cloning the latest secure iteration of a card from Legic.
The team was able to intercept "secure" transmissions between a reader emulator and the cards, thus allowing them to generate more "master" cards and child cards which would allow access to buildings, payments, and authenticate user ID's.
13.56 MHz cards are readable by commercially available scanners. Some of which are fairly inexpensive, and are readily available to the public. While the benefits are great, the risks are inherent when dealing with contactless cards.
We say: Rest assured your 13.56 smart cards, like CAC, PIV, TWIC, and FRAC will be safe from attack when work inside a SkimSAFE badge holder. Just dock the card to protect it, and slide it slightly downward with one hand to present the card to access control readers. It's a small investment in your security. Read more...
Subscribe to:
Post Comments (Atom)
Links to related pages
Card File
- Feb (2)
- Oct (2)
- Jun (2)
- May (2)
- Apr (4)
- Mar (2)
- Feb (2)
- Nov (3)
- Oct (3)
- Sep (2)
- Aug (1)
- Jul (6)
- Jun (1)
- May (3)
- Apr (1)
- Mar (5)
- Feb (1)
- Jan (6)
- Dec (3)
- Nov (2)
- Oct (5)
- Sep (2)
- Aug (4)
- Jul (8)
- Jun (3)
- May (2)
- Apr (4)
- Mar (4)
- Feb (3)
- Jan (4)
- Dec (9)
- Nov (3)
- Oct (4)
- Sep (5)
- Aug (5)
- Jul (5)
- Jun (6)
- May (3)
- Apr (13)
- Mar (11)
- Feb (13)
- Jan (10)
No comments:
Post a Comment