Attacks on Mobile Phones that Use the Vulnerability of NFC Technology

The article reviews the NFC technology, which is becoming more popular all over the world. The authors study the vulnerabilities of the standard that allow different types of fraud and provide the examples of attacks aimed at obtaining funds from the subscriber’s account, the contamination of mobile...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ 2012-09, Vol.19 (2S), p.60-64
Hauptverfasser: A. V. Starikovskiy, A. V. Zuykov, M. S. Aristov, D. A. Stepanyan
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The article reviews the NFC technology, which is becoming more popular all over the world. The authors study the vulnerabilities of the standard that allow different types of fraud and provide the examples of attacks aimed at obtaining funds from the subscriber’s account, the contamination of mobile phone with malware, as well as the output device failure.
ISSN:2074-7128
2074-7136