![]() HID, a leading proximity-card manufacturer, said in June its legacy 125KHz cards are vulnerable, yet are still in place in 80 percent of physical access control systems despite the availability of more secure alternatives. For a large company with 100,000 employees, you’re looking at least that many replacement badges and readers, often in many countries. An attacker can in theory capture card data, clone it onto a new card, and be able to access a physical facility.Ĭompounding the problem for enterprises is these readers and badges often end up managed by physical security teams and generally operate on a 20-year product lifecycle. The RFID systems have no security, such as encryption, behind them, making it trivial to intercept badge information. ![]() “Every office we tested, whether it was a Fortune 100 customer or government agency, I’ve not come across a system not using one of these legacy readers.” “Hopefully we can start getting ahead of these attacks as they become more applicable,” Brown said, highlighting the example of Disney moving to RFID readers for everything from ticketing, fast passes inside its parks, and souvenir purchases with a Disney-specific credit card.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |