DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Security

Kaspersky Warns Smartphone Users About Malicious NFC Tags

DigitalCIO Bureau by DigitalCIO Bureau
January 3, 2025
in Security, Tech News
0
Kaspersky Warns Smartphone Users About Malicious NFC Tags
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

The festive shopping season is just over. Whereas once cash was king, now more shoppers than ever use their mobile phone’s electronic wallet as a contactless payment system when buying items, replacing credit cards or electronic ticket smart cards.

Smartphones increasingly rely on Near Field Communication (NFC) technology for convenience and connectivity, but cybersecurity experts warn about a rising threat: NFC tag tampering. This tactic, often overlooked, can expose users to phishing attacks, malware, and data theft with a simple tap of their phone.

“NFC technology is incredibly convenient, but it’s also a vector for malicious activity if users aren’t cautious,” warns Marc Rivero, Lead Security Researcher at Kaspersky. “Innocent-looking tags in public spaces can be reprogrammed or replaced to carry out harmful actions. As the adoption of NFC continues to grow in areas like payments, public transport, and marketing, we anticipate that malicious actors will become increasingly sophisticated in their tactics. In the next few years, NFC-related attacks could potentially target thousands of users globally, particularly in urban areas where NFC usage is widespread. Awareness and proactive measures are key to mitigating these risks.”

How NFC tag tampering works
NFC tags are widely used in marketing campaigns, public transport systems, and smart home setups to enable quick, touch-free interactions. However, this same convenience makes them susceptible to tampering by malicious actors.

One method involves reprogramming legitimate NFC tags. These tags, when left unlocked, can be altered to redirect users to phishing sites, initiate unintended actions on their devices, or even deliver harmful software payloads. Another method is the physical replacement of original NFC tags. For example, attackers might swap out a genuine tag on a public poster or kiosk, in high-traffic areas like transportation hubs, cafes, or retail stores, with one that triggers harmful behaviors.

The dangers of malicious NFC tags
The consequences of interacting with a malicious NFC tag can be severe. Phishing attacks are among the most common outcomes, where users are redirected to fraudulent websites designed to steal personal information or login credentials. It’s possible that vulnerabilities in a smartphone’s NFC reader can be exploited to execute harmful code, compromising the device’s security. Malicious NFC tags can also prompt users to download apps or files containing malware, which may steal data, track activity, or damage the device. The seemingly small act of scanning a tampered NFC tag can thus lead to significant financial and privacy repercussions.

Protect yourself against NFC tag tampering
To stay safe, users are encouraged to adopt these simple but effective measures:

  1. Inspect NFC tags. Avoid scanning tags in untrusted or suspicious locations and look for signs of tampering.
  2. Verify actions. Always carefully explore the URL or action triggered by a tag before proceeding.
  3. Disable automatic actions. Configure your smartphone to require confirmation before executing NFC-related commands. Install a reliable security solutionon the device to reduce the risks.
  4. Stay updated. Ensure your smartphone’s software is up to date to protect against known vulnerabilities.

Advice for businesses
Organizations using NFC technology should take proactive steps to secure their systems and protect their users:

  • Use locked or “read-only” NFC tags to prevent tampering.
  • Regularly inspect their tags in public spaces for alterations.
  • Educate customers and employees about safe NFC practices.

 

Tags: Kaspersky
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Infosys and Anthropic Announce Collaboration to Unlock AI Value across Complex, Regulated Industries

by DigitalCIO Bureau
February 18, 2026
0
Infosys and Anthropic Announce Collaboration to Unlock AI Value across Complex, Regulated Industries

Collaboration launches in telecommunications with dedicated Anthropic Center of Excellence, expanding across financial services, manufacturing, and software development Infosys Topaz and Anthropic’s Claude models, including Claude Code, combine...

Read moreDetails

ToneTag Announces Investment from Qualcomm Ventures to Accelerate the Future of Edge AI and Proximity-Based Payments

by DigitalCIO Bureau
February 18, 2026
0
ToneTag Announces Investment from Qualcomm Ventures to Accelerate the Future of Edge AI and Proximity-Based Payments

ToneTag today announced an investment from Qualcomm Ventures , the investment arm of Qualcomm Incorporated, a global leader in wireless and edge computing technologies. ToneTag aims to enable...

Read moreDetails

TCS and AMD to bring state-of-the-art ‘Helios’ rack-scale AI architecture to India

by DigitalCIO Bureau
February 16, 2026
0
TCS and AMD to bring state-of-the-art ‘Helios’ rack-scale AI architecture to India

Tata Consultancy Services (TCS) and AMD have expanded their strategic collaboration. TCS, through its subsidiary HyperVault AI Data Center Limited (HyperVault), and AMD will co‑develop a rack‑scale AI infrastructure...

Read moreDetails

AI, Regulation & Quantum to Shape Top Cybersecurity Trends in 2026: Gartner

by DigitalCIO Bureau
February 9, 2026
0
LockBit Ransomware Hacker Sentenced to Prison in Canada

The chaotic rise of AI, geopolitical tensions, regulatory volatility and an accelerating threat landscape are the driving forces behind the top cybersecurity trends for 2026, according to Gartner, Inc. a business...

Read moreDetails

Massive Cyber-Espionage Campaign Affects 37 Countries

by DigitalCIO Bureau
February 9, 2026
0
Retail Industry — Next Big Target for Hackers?

Sensitive systems of organizations in 37 countries have been compromised in a large-scale cyberespionage campaign. The campaign is the work of a state-sponsored threat actor, designated TGR-STA-1030. This...

Read moreDetails
Next Post
Entrust Recognised In Gartner Magic Quadrant

Entrust Recognised In Gartner Magic Quadrant

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Gartner: 69% Of Top-Performing CISOs Dedicate Time For Personal Professional Development

Gartner: 69% Of Top-Performing CISOs Dedicate Time For Personal Professional Development

September 4, 2023
Microsoft Collaborates with NVIDIA

HCLTech boosts AI, ML offerings with new Microsoft Azure specializations

March 27, 2024

IT spend to touch $94 billion in 2020 on wings of software

November 12, 2019

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Internet of Things (IoT) Kaspersky Microsoft New Relic NTT DATA NVIDIA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?