We recently encountered a high-risk Android app detected as ANDROIDOS_STIP.A in Chile. This app, found distributed through forums and blogs, can be used to hack into the user’s RFID bus transit card to recharge the credits. What is the mechanism behind this, and what is the security risk of RFID payment cards in general? May 2, 2016 - RFID reader clone Chris Snyder/Tech Insider Hackers can break into just about any office using a device that will steal the data from the.
![Rfid Rfid](/uploads/1/2/5/7/125745572/973017664.jpg)
Some people get inked, while others get henna or those water transfer tattoos you might find in a box of Cracker Jack. [Becky] wanted the benefits of having an RFID tag in her finger — unlock doors or log into your computer with a swipe of your finger — but wasn’t ready to get an implant. Her solution: make an artistic ring that conceals a tiny glass capsule RFID tag.
Besides not having to shove some tech under your epidermis, there are a few other advantages: you can change out tags as easy as changing rings, for one. You can also easily loan your ring to someone just as you might give them keys to your door.