Just by getting a few centimeters from a phone running NFC (Near Field Communications) with a malicious NFC tag you can take control of that phone. Charlie Miller demonstrated the attack at Black Hat using an Android phone and some test devices he created.
Source: http://feeds.informationweek.com/click.phdo?i=0ba699c108d32cb1e4f54a628e76919e

0 comments:
Post a Comment