The Blog

  • HOME

Monday, September 24, 2012

Using Android and NFC for fare dodging

http://www.h-online.com/security/news/item/Using-Android-and-NFC-for-fare-dodging-1715821.html

https://play.google.com/store/apps/details?id=com.intrepidus.ultracardtester

Posted by Ozer Goker at 8:38 PM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Search This Blog

Blog Archive

  • ►  2020 (1)
    • ►  April (1)
      • ►  Apr 28 (1)
  • ►  2019 (5)
    • ►  July (3)
      • ►  Jul 26 (1)
      • ►  Jul 18 (2)
    • ►  March (2)
      • ►  Mar 08 (1)
      • ►  Mar 07 (1)
  • ►  2018 (2)
    • ►  October (2)
      • ►  Oct 30 (1)
      • ►  Oct 11 (1)
  • ►  2017 (5)
    • ►  September (2)
      • ►  Sep 18 (1)
      • ►  Sep 14 (1)
    • ►  July (2)
      • ►  Jul 21 (1)
      • ►  Jul 19 (1)
    • ►  February (1)
      • ►  Feb 22 (1)
  • ►  2016 (1)
    • ►  February (1)
      • ►  Feb 05 (1)
  • ►  2015 (1)
    • ►  May (1)
      • ►  May 13 (1)
  • ►  2014 (4)
    • ►  December (2)
      • ►  Dec 14 (2)
    • ►  May (1)
      • ►  May 10 (1)
    • ►  January (1)
      • ►  Jan 31 (1)
  • ►  2013 (275)
    • ►  April (57)
      • ►  Apr 29 (5)
      • ►  Apr 25 (2)
      • ►  Apr 24 (10)
      • ►  Apr 16 (12)
      • ►  Apr 11 (12)
      • ►  Apr 06 (8)
      • ►  Apr 03 (1)
      • ►  Apr 02 (6)
      • ►  Apr 01 (1)
    • ►  March (46)
      • ►  Mar 31 (1)
      • ►  Mar 28 (9)
      • ►  Mar 27 (1)
      • ►  Mar 26 (1)
      • ►  Mar 25 (4)
      • ►  Mar 20 (1)
      • ►  Mar 19 (17)
      • ►  Mar 15 (5)
      • ►  Mar 13 (1)
      • ►  Mar 06 (1)
      • ►  Mar 05 (5)
    • ►  February (44)
      • ►  Feb 28 (8)
      • ►  Feb 18 (1)
      • ►  Feb 15 (5)
      • ►  Feb 13 (9)
      • ►  Feb 11 (9)
      • ►  Feb 04 (9)
      • ►  Feb 01 (3)
    • ►  January (128)
      • ►  Jan 31 (9)
      • ►  Jan 30 (4)
      • ►  Jan 29 (6)
      • ►  Jan 28 (7)
      • ►  Jan 25 (13)
      • ►  Jan 23 (8)
      • ►  Jan 22 (10)
      • ►  Jan 21 (6)
      • ►  Jan 18 (1)
      • ►  Jan 17 (7)
      • ►  Jan 11 (2)
      • ►  Jan 10 (11)
      • ►  Jan 09 (8)
      • ►  Jan 08 (12)
      • ►  Jan 07 (4)
      • ►  Jan 04 (7)
      • ►  Jan 03 (1)
      • ►  Jan 02 (12)
  • ▼  2012 (501)
    • ►  December (16)
      • ►  Dec 27 (6)
      • ►  Dec 06 (4)
      • ►  Dec 02 (2)
      • ►  Dec 01 (4)
    • ►  November (51)
      • ►  Nov 30 (5)
      • ►  Nov 28 (2)
      • ►  Nov 27 (4)
      • ►  Nov 26 (2)
      • ►  Nov 25 (1)
      • ►  Nov 22 (3)
      • ►  Nov 20 (1)
      • ►  Nov 18 (3)
      • ►  Nov 16 (1)
      • ►  Nov 13 (5)
      • ►  Nov 12 (1)
      • ►  Nov 08 (4)
      • ►  Nov 07 (8)
      • ►  Nov 06 (7)
      • ►  Nov 05 (2)
      • ►  Nov 04 (1)
      • ►  Nov 03 (1)
    • ►  October (85)
      • ►  Oct 31 (6)
      • ►  Oct 30 (2)
      • ►  Oct 29 (9)
      • ►  Oct 11 (8)
      • ►  Oct 08 (14)
      • ►  Oct 06 (1)
      • ►  Oct 05 (15)
      • ►  Oct 04 (11)
      • ►  Oct 02 (9)
      • ►  Oct 01 (10)
    • ▼  September (305)
      • ►  Sep 30 (10)
      • ►  Sep 29 (7)
      • ►  Sep 28 (7)
      • ►  Sep 27 (7)
      • ►  Sep 26 (16)
      • ►  Sep 25 (20)
      • ▼  Sep 24 (30)
        • Clone RFID Tags with Proxmark 3
        • A Visual History of Mac OS
        • A Visual History of Microsoft Windows
        • Some Cyber criminals Most wanted by FBI
        • Backdoor:OSX/Imuler.B No Likes Wireshark
        • eForensics Mobile 2/2012
        • Tiny Evil Maid CHKDSK Utility Can Steal Passwords
        • An Interview With Eugene Kaspersky
        • Drop test: iPhone 5 vs. Samsung Galaxy S III [video]
        • Microsoft Windows Update emails try to steal your ...
        • Microsoft warns of Flash vulnerability on IE 10 an...
        • Would you insure your Twitter or Facebook account ...
        • Using Android and NFC for fare dodging
        • The 5 most popular Twitter users
        • Alexa Top 500 Global Sites
        • Real Time Satellite Tracking
        • Trojan Written in Google Go Found in the Wild
        • Hackers deface old UTS system, dump user database
        • HAKIN9 Raspberry Pi Hacking – Exploiting Software ...
        • iPhone 5 and 4 Hacked with same Exploit
        • The HoneyMap shows cyber attacks on the Honeynet P...
        • Lost+Found: Touchtone injection, hacking lessons a...
        • Behind the Captcha or Inside Blackhole Exploit Kit...
        • Iran readies domestic Internet system, blocks Google
        • Just how hackable is your digital life?
        • Showdown: Parallels Desktop 8 vs. VMware Fusion 5
        • Twitter DMs from your friends can lead to Facebook...
        • Kim Dotcom now a "real life James Bond villain" in...
        • Apple Mountain Lion 10.8.2 - lots of bug fixes, no...
        • Savviest hackers hail from Eastern Europe, researc...
      • ►  Sep 23 (6)
      • ►  Sep 22 (6)
      • ►  Sep 21 (12)
      • ►  Sep 20 (14)
      • ►  Sep 19 (22)
      • ►  Sep 18 (21)
      • ►  Sep 17 (18)
      • ►  Sep 16 (10)
      • ►  Sep 14 (16)
      • ►  Sep 13 (13)
      • ►  Sep 12 (5)
      • ►  Sep 11 (5)
      • ►  Sep 10 (22)
      • ►  Sep 09 (2)
      • ►  Sep 08 (11)
      • ►  Sep 07 (1)
      • ►  Sep 06 (1)
      • ►  Sep 05 (9)
      • ►  Sep 03 (9)
      • ►  Sep 02 (5)
    • ►  August (44)
      • ►  Aug 30 (2)
      • ►  Aug 28 (6)
      • ►  Aug 27 (4)
      • ►  Aug 26 (4)
      • ►  Aug 23 (2)
      • ►  Aug 22 (1)
      • ►  Aug 21 (3)
      • ►  Aug 17 (10)
      • ►  Aug 16 (4)
      • ►  Aug 15 (8)