Attacks on Mobile Phones that Use the Vulnerability of NFC Technology
The article reviews the NFC technology, which is becoming more popular all over the world. The authors study the vulnerabilities of the standard that allow different types of fraud and provide the examples of attacks aimed at obtaining funds from the subscriber’s account, the contamination of mobile...
Gespeichert in:
Veröffentlicht in: | Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ 2012-09, Vol.19 (2S), p.60-64 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The article reviews the NFC technology, which is becoming more popular all over the world. The authors study the vulnerabilities of the standard that allow different types of fraud and provide the examples of attacks aimed at obtaining funds from the subscriber’s account, the contamination of mobile phone with malware, as well as the output device failure. |
---|---|
ISSN: | 2074-7128 2074-7136 |