Connect with us

Published

on

Smartphones rely on Near Field Communication (NFC) technology for convenience and fast connection. But cybersecurity experts warn of increasing threats from tampering with NFC tags.

Near Field Communication technology is incredibly useful. However, it is also a major gateway for malicious activities when users are not careful. Innocent-looking tags in public spaces can be reprogrammed or modified to perform harmful actions.

As NFC adoption in areas such as payments, public transportation, and marketing continues to expand, it is predicted that malicious actors will become increasingly sophisticated in their methods.

Over the next few years, attacks related to Near Field Communication could target thousands of users worldwide, primarily in urban areas where its use is widespread. The way to reduce these risks is through awareness and proactive measures.

contactless nfc

How does label tampering work?

Near Field Communication tags are widely used in marketing campaigns, public transportation systems and smart home installations to enable fast, contactless interaction. However, this convenience makes them vulnerable to tampering by malicious actors.

One method involves reprogramming legal Near Field Communication tags. When these tags are left unlocked, their content can be manipulated to redirect users to phishing sites, initiate unwanted actions on their devices, or even deliver malware payloads. Another method is to physically replace the original Near Field Communication tags.

For example, attackers can replace a real label on a public poster or kiosk in high-traffic areas such as transportation hubs, cafes, or retail stores with a different label that triggers harmful behavior.

contactless nfc

The dangers of malicious tags

Interacting with a malicious Near Field Communication tag can have serious consequences. Phishing attacks, in which users are directed to fake websites designed to steal personal information or login credentials, are among the most common results. Thus, by exploiting security vulnerabilities in a smartphone’s Near Field Communication reader, malicious codes can be run and the security of the device can be endangered.

Malicious Near Field Communication tags can also prompt users to download applications or files containing malware that can steal data, monitor activity, or damage the device. Therefore, a seemingly innocuous action like scanning a tampered Near Field Communication tag can lead to significant financial problems and loss of privacy.

hacker

Protect yourself from tampering with NFC tags

  1. Examine NFC tags. Avoid scanning tags in untrusted or suspicious locations and look for signs of tampering.
  2. Verify actions. Always carefully review the URL or action triggered by a tag before continuing.
  3. Disable automatic actions. Configure your smartphone to require confirmation before running NFC-related commands. To reduce risks, the device a reliable security solution install.
  4. Stay updated. Make sure your smartphone software is up to date to protect against known vulnerabilities.

Advice for businesses

Organizations using NFC technology should take the following proactive steps to secure their systems and protect their users:

  • Use locked or read-only NFC tags to prevent tampering.
  • Inspect labels in public areas regularly for changes.
  • Educate customers and employees on safe NFC practices.
Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Software

Samsung’s new foldable models come with Android 16 -based One UI 8

Samsung is changing routes in software updates with its new foldable phones to be released in the summer period. Galaxy Z Fold 7 and Z Flip 7 models will be the devices that offer Android 16 -based One UI 8 interface for the first time.

Published

on

Samsung's new foldable models come with Android 16 -based One UI 8

Samsung is changing routes in software updates with its new foldable phones to be released in the summer period. Galaxy Z Fold 7 and Z Flip 7 models will be the devices that offer Android 16 -based One UI 8 interface for the first time.

Samsung’s Galaxy Z Fold 7 and Z Flip 7 models, which will be released in summer, bring the company’s new software vision. These models will be the first devices that will come out of the box with the Android 16 -based One UI 8 operating system. With Samsung’s One UI 8 Beta process, both the output calendar and the details of the new software began to become clear.

Samsung One UI 8

Foldable phones attract attention not only with their hardware but also with their software innovations. The company says that one UI 8 will offer a much more advanced user experience. Thanks to artificial intelligence -supported features, it is stated that daily use will become more fluent, more personalized and efficient. Especially important innovations are expected in multi -tasks, notification management and interface design.

In previous years, Samsung’s most up -to -date software updates usually came with the Galaxy S series. However, this tradition is changing this year. Samsung has decided to start the newest version of one UI with foldable models in accordance with the Android 16’s output calendar. This brings the Galaxy Z Fold 7 and Z Flip 7 not only in design, but also to the pioneering position in terms of software.

Beta program is currently opened to some Galaxy S25 users. However, Z Fold 7 and Z Flip 7 are expected to be the first devices that come with a stable One UI 8 version. The software aims to provide especially foldable form factor -specific experiences. In this way, screen transitions, application use and general system interaction will become more intuitive.

Samsung’s The close cooperation with Google plays an important role in this transformation. The One UI 8, which works more integrated with Android 16, seems to take the hardware and software harmony to the highest level. New folds are expected to be introduced at the beginning of July, and these models will start a new era in Samsung’s software strategy.

Continue Reading

Software

Desktop mode is coming to Android according to the leaked source code

Google is finally preparing to meet the “Android Desktop Mode” feature, which it has been working on for a long time.

Published

on

Desktop mode is coming to Android according to the leaked source code

Google is finally preparing to meet the “Android Desktop Mode” feature, which it has been working on for a long time.

The leaked source codes reveal that this mode will offer a large screen experience similar to the Samsung Dex and Motorola Smart Connect. This feature, which seems difficult to reach to Android 16, will probably be released on Android 17 and will be specially for the new generation Pixel phones.

When the desktop mode is activated, you connect your phone to an external screen with the USB-C cable, renewable windows, taskbar and desktop-like navigation elements come into play. You can write e-mails with resized windows that allows you to manage multiple applications at the same time, run the browser tabs side by side, and easily move your files with the support of drag and drop. Used to Windows and Chrome OS will access a similar application drawer and notification center in Android Desktop Mode, and will reach frequently used applications from the taskbar.

Android

Google’s plans include offering a wireless connection option; In the following versions, it may be possible to reflect the mode directly to the screen with the Display Port protocol over Wi-Fi 6 or 6E. In the first place, this innovation, which will be special for Pixel, will be opened to other brands and OEMs over time. Thus, the operating system ecosystem will close the gap between mobile productivity and desktop computer -like usage and offer flexibility in both office and home environments.

The desktop mode makes Google’s vision of “one device, too much work”. Users, one hardware It will be able to manage telephone, tablet and desktop workflows without interruption. When the necessary improvements are completed, this mode is expected to transform Android experience and turn it into an important advantage in competition with Chromebooks.

Continue Reading

Software

Another feature of iOS 19 has emerged

There is not much time to introduce iOS 19. But already some details about the new operating system have been announced.

Published

on

Another feature of iOS 19 has emerged

There is not much time to introduce iOS 19. But already some details about the new operating system have been announced.

iOS 19will include a very useful change for users with big screen iPhone. According to rumors, the search bar in applications will be under the screen. In iOS 18, the standard search bar in an application usually stands close to the top of the screen. This can make it a little difficult to use on large -screen iPhones. The iPhone Pro Max already has a big screen. In addition, the iPhone 17 Air will come with a large screen. In iOS 19, it is absolutely hit to take the search bar under the screen. It will make it easy to use.

iOS 19

On the other hand, a hidden account of the iOS 19 update in X shared a list of phones that will receive. According to the source iPhone XR, iPhone XS and iPhone XS Max will not be installed iOS 19. In summary, Apple seems to end the support for these three phones. All other models running iOS 18 will benefit from the new operating system.

iPhone models will receive the iOS 19 update as follows:

-IPHONE 16E, iPhone 16, iPhone 16‌ Plus, iPhone 16 Pro, iPhone 16 Pro‌ Max
-IPHONE 15, iPhone 15‌ Plus, iPhone 15‌ Pro, iPhone 15‌ Pro Max
‌-iphone‌ 14, iPhone‌ 14 Plus, iPhone‌ 14 Pro, iPhone‌ 14 Pro Max
‌-iphone‌ 13, iPhone‌ 13 mini, iPhone‌ 13 pro, iPhone‌ 13 pro max
‌-iphone‌ 12, iPhone 12 mini, iPhone‌ 12 pro, iPhone 12 pro max
‌-iphone‌ 11, iPhone‌ 11 Pro, iPhone 11 Pro Max
‌-iphone‌ SE 2, iPhone SE 3

iOS 1 5

Although these models will support the new iOS version, advanced features can be limited to new iPhones with faster and more powerful equipment. For example, Apple Intelligence is limited to only iPhone 15 pro’lar and iPhone 16 family. Because they have 8 GB of RAM on these phones, they can benefit from artificial intelligence features. All models under the iPhone 15 Pro has less than 8 GB of RAM. They do not support Apple Intelligence’s minimum RAM need.

Continue Reading

Trending

Copyright © 2022 RAZORU NEWS.
Project by V