Friday, June 01, 2007

RFID Viruses and Worms

RFID Viruses and WormsRadio Frequency Identification (RFID) is the latest phase in the decades-old trend of the miniaturization of computers. RFID transponders are tiny resource-limited computers that do not have a battery that needs periodic replacement. RFID tags are inductively powered by their external reading devices, called RFID readers.

Unfortunately, businesses and governments are not the only ones interested in RFID. Civil liberties groups, hackers and criminals are also keenly interested in this new development, albeit for very different reasons.

Read the article HERE.

Vulnerabilities that Can Be Exploited

The database, or the middleware's handling of the database, is one of the areas where vulnerabilities may arise.

RFID middleware systems generally use a database to store information that is read from tags and written to them. If the middleware does not treat the data read from the tag correctly, it may be possible to trick the database into executing SQL code that is stored on the tag. This is known as SQL injection.

Read the article HERE.


Post a Comment

Links to this post:

Create a Link

<< Home