Remove tag cryptanalysis
article thumbnail

IoT Secure Development Guide

Pen Test Partners

Semi-passive tags are also available in that they need temporary energy from a card reader to power up a low power microcontroller inside the tag. Hardware tools like the Proxmark3, and even software on Android smartphones can be used to interact with and clone RFID tags.

IoT 52
article thumbnail

The Hacker Mind Podcast: Hacking Teslas

ForAllSecure

This has turned into a RFID tag, which is a fob that you carry in your pocket and the fob reaches out to the car and it will unlock the car or lock the car. I was blinded by that low price tag. So the air tag had that stocking problem like in February this year, a big outcry.

Hacking 52