The recurring topic of RFID security flaws has been making headlines again lately. But unlike new e-mail viruses or Internet worms that demand the immediate attention of the IT department, this threat ...
Awareness of consumer privacy issues and tight security must go hand in hand if RFID technology is to flourish, according to industry experts. A set of RFID guidelines designed to help protect ...
This article was originally published by RFID Update. September 4, 2008—The RFID Security Alliance (RFIDSA) officially announced its formation as a resource to provide education and assistance for ...
Don’t be surprised if, in the near future, you need a key card and a smile to gain entry into your workplace. Security experts say that some smart cards, which have embedded RFID tags, can be easily ...
A 2026 informational report on Guardality's CyberShield RFID blocking card — covering digital identity theft protection features, contactless card skimming prevention technology, wallet security ...
RFID will someday revolutionize business, but that won’t occur until serious security issues are resolved. That was the message delivered Monday at InfoSec World by Kevin Ashton, founder and director ...
Today’s retail environment has evolved. Theft is more frequent, more organized and more complex, pushing retailers to seek ...
Organizations that use RFID devices should systematically evaluate potential security and privacy risks posed by the technology, U.S. government officials say in a new report (PDF format) detailing ...
Expert reviews and hands-on evaluations have identified leading anti-theft travel bags, backpacks, and RFID-blocking wallets that combine security, durability, and style. Assessments included ...
Opinions expressed by Digital Journal contributors are their own. These days, everything runs on technology. That’s great for convenience, but it also means our personal information is vulnerable to ...
Dublin - Research and Markets (http://www.researchandmarkets.com/reports/c28024) has announced the addition of Securing RFID: Vendor Strategies to Pre-Empt the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results