Remove tag cars
article thumbnail

Cheating Automatic Toll Booths by Obscuring License Plates

Schneier on Security

Bramwell-Stewart said one driver from New Jersey repeatedly used what’s known in the streets as a flipper, which lets you remotely swap out a car’s real plate for a bogus one ahead of a toll area. One minute it had New York plates, the next it sported Texas tags. Boing Boing post.

248
248
article thumbnail

Canada to ban the Flipper Zero to stop surge in car thefts

Bleeping Computer

The Canadian government plans to ban the Flipper Zero and similar devices after tagging them as tools thieves can use to steal cars. [.]

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Thieves Using AirTags to “Follow” Cars

Schneier on Security

Brand name “air tags” are placed in out-of-sight areas of the target vehicles when they are parked in public places like malls or parking lots. Apple responded with a slew of anti-stalking measures , but those are more intended for keeping people safe than cars.

309
309
article thumbnail

Google adds unwanted tracker detection to Find My Device network

Malwarebytes

The basic principle of these tags is that anyone with the matching app and permissions on their device (usually a phone) contributes to find the last location where the tag was detected. This could happen if a criminal planted a tag on your laptop so they could track its location.

article thumbnail

Google and Apple cooperate to address unwanted tracking

Malwarebytes

The basic principle of these tags is that anyone with the matching app and permissions on their device (usually a phone) contributes to find the last location where the tag was detected. But a bill doesn’t stop those that had criminal intentions anyway.

article thumbnail

RFID: Is it Secret? Is it Safe?

Approachable Cyber Threats

RFID uses electromagnetic fields in the form of radio waves to establish communication links between an RFID tag or transmitter and an RFID reader or receiver. Pieces of information are transmitted through the link that the reader uses to establish authenticity of the tag or transmitter and authorize access.

Risk 119
article thumbnail

NIST Issues Call for "Lightweight Cryptography" Algorithms

Schneier on Security

Similar small electronics exist in the keyless entry fobs to newer-model cars and the Radio Frequency Identification (RFID) tags used to locate boxes in vast warehouses. All of these gadgets are inexpensive to make and will fit nearly anywhere, but common encryption methods may demand more electronic resources than they possess.

IoT 175