LoRaWAN Security Overview
Low Power Wide Area Networks (LPWANs) are emerging to address Internet of Things applications where devices are distributed over a wide area. Think …
Low Power Wide Area Networks (LPWANs) are emerging to address Internet of Things applications where devices are distributed over a wide area. Think …
Depending on the application, NFC/RFID tags may or may not require some level of security. If you were only interested in tracking assets, a simple serial number …
No one is immune from losing luggage on a flight, not even the CEO of Alaska Airlines. Delta has a plan to introduce RFID luggage tags later this summer that they hope may significantly help with the issue. …
NFC is a great technology. It allows us to easily access and share information. Its functionality is perfect for our smartphone-connected world. At …
Counterfeit wines made headlines in the world of rare wine collecting with two fascinating stories. The first story is the New Yorker’s …
We know manufacturers care about counterfeits. High quality counterfeits compete directly with the genuine article leading to lost sales. Low …
Intermediaries refer to all parties in the supply chain. They include raw material suppliers, manufacturers, distributors, shipping companies, …
The most common use for NFC technology is to turn a smartphone into a digital wallet. It can collect and store the data from credit and debit cards …
The options for using NFC tags in advertising are endless. NFC (or near field communication) is a wireless technology that facilitates fast and efficient …
Consumers search online for authentic products at the very best prices. Unfortunately, they have no way to tell if they are purchasing a knockoff. …
Despite efforts to combat counterfeits, Alibaba ecommerce websites reportedly “encourage, assist” fake merchandise.
In this post we compare two technologies: NFC tags and the well-established QR codes.
NFC tags can be used in a wide variety of ways to help make your life easier.
Understanding the customer’s behaviour is key to the success for most manufacturers. Billions have been spent in research. Countless hours have gone …
In 2013 the World Customs Organization (WCO) said, “Counterfeit goods account for nearly 10 percent of worldwide trade, an estimated $500 billion …
In a recent CTV W5 Episode investigators highlight the extent of counterfeit goods in apparel, memorabilia and event ticket markets. They highlight a …
NFC security is highly dependant on the targeted application and mode of operation. This post explores the three modes of NFC: Tag Reader/Writer, Card …
I recently attended an NFC Forum meeting in Edinburgh, Scotland. On my last day in the city I hiked up to Arthur’s Seat in Holyrood Park. I highly …
This question was posted a few years ago by Eric Vétillard in this blog post.
I found some great NFC infographics to explain the technology. The first one is a comparison between RFID & NFC. It captures the differences nicely. RFID …
Most smart phones (sans the iPhone) are NFC enabled out of the box and can read NFC tags without installing any apps. Naturally early adopters will want …
With Apple’s introduction of iBeacon & Bluetooth LE (BLE) some have proclaimed the end of Near Field Communication (NFC). These two technologies are …
My plan is to write about mobile wireless technologies & security. As the chair of the NFC Forum Security WG I come across many interesting opinions …