How secure is NFC tech? (2024)

How secure is NFC tech? (1)

In the near future, your technological world might be overtaken by near field. No, not the corn field that's across the road. We're talking about near-field communication (NFC), which gadget manufacturers, retailers and many other organizations hope will bring powerful new features to smartphones and much more.

NFC is a type of radio communication standard, much like Bluetooth, WiFi and other networking technologies. It's different in that it operates at very slow speeds and only at a short range of just a few centimeters. You can see our detailed rundown on it in How Near Field Communication Works.

Advertisem*nt

NFC isn't a newfangled technology, but it's just now beginning to filter into mainstream products like smartphones. With an NFC chip and antenna, you can use your smartphone to make contactless payments at NFC retail terminals, parking meters, taxis and many other places.

What's more, with NFC, you can bump smartphones to exchange information with friends or business colleagues, or use your phone to read smart tags. Smart tags are tiny, read-only chips that can appear in informational posters and identification documents, such as corporate badges or passports.

You can even use NFC to connect to secure networks without having to enter complex authorization codes. For instance, you may be able to tap an NFC tablet to a wireless router and after the NFC chip confirms your identity, your tablet is cleared to connect to the much faster WiFi signal so that you can get to work.

Ultimately, NFC makes it a whole lot easier to perform a huge range of digitized tasks. But with that kind of power in such a tiny chip, is this technology really secure?

Many experts say NFC really is fundamentally secure by virtue of its extremely short range. In order to snag your NFC signal, a hacker would need to be very close to you. Uncomfortably close. In other words, you'd know they were there. And unless it was a very intimate friend of yours, you'd likely not be happy about it.

There's more to the physical aspects of NFC that make it troublesome for even determined hackers.

Contents

  1. Time for Your NFC Physical
  2. NFC Hacks are Wack

Time for Your NFC Physical

How secure is NFC tech? (2)

Security experts stress that NFC doesn't come loaded with built-in, hardware-driven security measures. NFC is just a platform for establishing communication between two devices. But NFC's short range, in a sense, serves as a safeguard against hackers. In order to grab an NFC signal from thin air (called eavesdropping), an attacker would have to accomplish a few critical things.

First, he'd have to be close enough. Many NFC applications work at such short range that you virtually have to touch a smartphone to an NFC device in order to establish the connection. So a hacker could hope to brush up against unsuspecting people on the subway and do his version of digital pickpocketing, right?

Advertisem*nt

Well, the NFC functions on your phone only go into active mode when you want them to. For instance, the chip will activate when you check out at retail store using an NFC terminal. The chip isn't even working when your phone is in standby mode.

Even if a hacker was close enough to you at just the right moment, he'd still need some serious luck. NFC signals are extremely sensitive in terms of direction. So sensitive, in fact, that if you turn your phone just slightly, it won't be able to read a smart tag. For a hacker to illicitly grab your signal, he'd have to somehow maneuver a hacking device's antenna into precisely the right angle.

Hackers might have a much easier time pilfering data through other means. Thieves could use the longer range of WiFi and Bluetooth signals and hunt for those that careless people fail to protect with passwords or any kind of encryption whatsoever. Bolder criminals can simply peer over your shoulder while you type your PIN and then grab your phone on the street.

Yet the onus for security falls on every link in the chain of NFC transactions, from hardware and software makers, right down to the end user, who needs to make smart, tech-savvy choices. On the next page see how a few protections can shield your NFC activities from evildoers.

Advertisem*nt

NFC Hacks are Wack

How secure is NFC tech? (3)

Just about anything digital can be hacked. All it takes is a savvy geek with a criminal streak. As you wade into the waters of NFC's capabilities, you'll want to be aware of the risks you're taking lest you wind up drowning in newfangled digital dangers.

One risk rests with smart tags. For example, a tag embedded in a promotional movie poster ostensibly directs you to a film trailer. But hackers can corrupt or reprogram tags for their own purposes by breaking the tag's encryption and then loading their malicious code in the memory. So instead of seeing a trailer, your phone surreptitiously sends personal information to an unknown device via text message or other communication service.

Advertisem*nt

Privacy concerns are also valid. When you buy groceries at a store and want to use your NFC phone to claim your loyalty points, the store's system clearly has to identify you, likely making a record of when and what you purchased, for the purpose of targeting you later with ads designed for your preferences. Yet there are no guarantees that some stores won't find a way to sell your information to third-party businesses, which might pay a steep price for that kind of juicy data.

To keep your data safe, you can take a few precautions. Don't tap any tags that aren't somehow physically protected, perhaps behind glass or plastic; those that swing freely in public places are much more likely to be tampered with.

When you do tap a tag, carefully watch your phone to see what actions the tag prompts. Often, there are suspicious, tell-tale prompts that appear (much like aggravating pop-up browser screens on your computer) serving as warnings that something is awry.

Don't bump phones to exchange information with people you aren't sure you can trust. A smart hacker with a big smile can potentially use this opportunity to transfer spyware to your phone.

You'll be relying primarily on software developers to add layers of password protection and encryption to their products and applications. But to stay ahead of the game and make yourself a much harder target, you'll want to stay up to date on potential security issues, on sites such as NFC News and NFC World.

NFC has a lot of promise in terms of simplifying and unifying all sorts of technologies, from payments to network connection setups. But like all evolving digital magic, personal protection is paramount, so educating yourself on security alerts could save you a lot of NFC heartache.

Advertisem*nt

Lots More Information

Related Articles
  • How RFID Works
  • Are RFID ignition systems secure?
  • How Near Field Communication Works
  • How Blink Technology Works
  • How does ATM skimming work?
  • How Pet Microchipping Works
  • What is bluejacking?
  • Could hackers devastate the U.S. economy?
More Great Links

  • Cavoukian, Ann. "Mobile Near Field Communications (NFC) 'Tap 'n Go' Keep it Secure and Private." IPC.on.ca. (Feb. 6, 2012) http://www.ipc.on.ca/images/Resources/mobile-nfc.pdf
  • Dolphie, Gordon. Director of Marketing at Intel. Personal Interview. Jan. 27, 2012. (Feb. 6, 2012)
  • Emligh, Jacqueline. "Smartphones are Turning into Wireless Wallets." Brighthand.com. Mar. 6, 2011. (Feb. 6, 2012) http://www.brighthand.com/default.asp?newsID=17577&p=3
  • European Network and Information Security Agency. "Top Ten Smartphone Risks." Enisa.europa.eu. (Feb. 6, 2012) http://www.enisa.europa.eu/act/application-security/smartphone-security-1/top-ten-risks
  • Lishoy, Francis, et al. "Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones." Eprint.iacr.org. 2011. (Feb. 6, 2012) http://eprint.iacr.org/2011/618.pdf
  • Meyn, Hauke. Senior Principal System Architect at NXP. Personal interview. Jan. 25, 2012.
  • Molen, Brad. "Engadget Primed: What is NFC and Why do We Care?" Engadget.com. Jun. 10, 2011. (Feb. 6, 2012) http://www.engadget.com/2011/06/10/engadget-primed-what-is-nfc-and-why-do-we-care/
  • Mulliner, Collin. "Attacking NFC Mobile Phones." Mulliner.org. May 2008. (Feb. 6, 2012) http://mulliner.org/nfc/feed/collin_mulliner_eusecwest08_attacking_nfc_phones.pdf
  • Planck, Seth. "Viaforensics Finds Google Wallet Security Vulnerability with a Rooted Android Phone." NFCrumors.com. Dec. 14, 2011. (Feb. 6, 2012) http://www.nfcrumors.com/tag/man-in-the-middle-attack/
How secure is NFC tech? (2024)
Top Articles
Easy Jewelry To Make and Sell | 11 Popular Types
First time homebuyers credit received in 2008 for a home bought in 2009
AllHere, praised for creating LAUSD’s $6M AI chatbot, files for bankruptcy
Splunk Stats Count By Hour
Costco The Dalles Or
Www.craigslist Augusta Ga
The Realcaca Girl Leaked
Localfedex.com
P2P4U Net Soccer
Gunshots, panic and then fury - BBC correspondent's account of Trump shooting
CHESAPEAKE WV :: Topix, Craigslist Replacement
THE 10 BEST River Retreats for 2024/2025
Mini Handy 2024: Die besten Mini Smartphones | Purdroid.de
Nwi Arrests Lake County
Mbta Commuter Rail Lowell Line Schedule
Delaware Skip The Games
Pinellas Fire Active Calls
Jet Ski Rental Conneaut Lake Pa
Fort Mccoy Fire Map
Graphic Look Inside Jeffrey Dahmer
Ezel Detailing
The EyeDoctors Optometrists, 1835 NW Topeka Blvd, Topeka, KS 66608, US - MapQuest
Dragonvale Valor Dragon
Holiday Gift Bearer In Egypt
15 Primewire Alternatives for Viewing Free Streams (2024)
Amerisourcebergen Thoughtspot 2023
SOGo Groupware - Rechenzentrum Universität Osnabrück
Cfv Mychart
Askhistorians Book List
Red Sox Starting Pitcher Tonight
Does Circle K Sell Elf Bars
Marine Forecast Sandy Hook To Manasquan Inlet
Keeper Of The Lost Cities Series - Shannon Messenger
Avance Primary Care Morrisville
Vivek Flowers Chantilly
World History Kazwire
Barber Gym Quantico Hours
Directions To The Closest Auto Parts Store
Actor and beloved baritone James Earl Jones dies at 93
Bustednewspaper.com Rockbridge County Va
Tinfoil Unable To Start Software 2022
Grand Valley State University Library Hours
Tropical Smoothie Address
Kenwood M-918DAB-H Heim-Audio-Mikrosystem DAB, DAB+, FM 10 W Bluetooth von expert Technomarkt
The Quiet Girl Showtimes Near Landmark Plaza Frontenac
300+ Unique Hair Salon Names 2024
Missed Connections Dayton Ohio
Greg Steube Height
Www Ventusky
Vrca File Converter
Latest Posts
Article information

Author: Tuan Roob DDS

Last Updated:

Views: 5908

Rating: 4.1 / 5 (62 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Tuan Roob DDS

Birthday: 1999-11-20

Address: Suite 592 642 Pfannerstill Island, South Keila, LA 74970-3076

Phone: +9617721773649

Job: Marketing Producer

Hobby: Skydiving, Flag Football, Knitting, Running, Lego building, Hunting, Juggling

Introduction: My name is Tuan Roob DDS, I am a friendly, good, energetic, faithful, fantastic, gentle, enchanting person who loves writing and wants to share my knowledge and understanding with you.