Great Falls, Va.-based epcSolutions, Inc., announced the release of version 3.5 of its RFID software, RFIDTagManagerTM. The 3.5 release now provides complete DoD mandate compliance, with the added ...
Wireless card readers are everywhere — but they’re easy to spoof or otherwise attack if you have the right tools Wireless card readers are everywhere — but they’re easy to spoof or otherwise attack if ...
ResearchAndMarkets.com has released a new report titled “RFID Market by Offering (Tags, Readers, Software & Services), Tag Type (Passive, Active), Wafer Size ...
Point-of-use vending and dispensing helps manage and control the use of regularly required MRO, safety supplies, and high volume and high-value items, thus reducing waste, lowering cost, and ...
A tool that enables a hacker or penetration tester to capture RFID card data from up to three feet away will be released next week at Black Hat. Out of necessity come many interesting inventions. Fran ...
RFID tags wirelessly provide a wealth of information on products or other items, but they can only be read by dedicated portable devices. That may soon change, however, as a tag-integrated chip and a ...
The security of an RFID system, as with almost any payment or information technology system, depends on how it is set up. If a transit company is issuing transponders with unique serial numbers and ...