Skip to main content
0

Wired reports that a team of researchers have developed a method for extracting authentication keys out of HID encoders, which could allow hackers to clone the types of keycards used to secure offices and other areas worldwide.

Researchers plan to present a technique that allowed them to pull authentication keys out of the most protected portion of the memory of HID encoders, the company’s devices used for programming the keycards used in customer installations. Instead of requiring that an intruder get access to an HID encoder, whose sale the company attempts to restrict to known customers, the method the researchers plan to show on the Defcon stage now potentially allows HID’s secret keys to be pulled out of any encoder, shared among hackers, and even sold or leaked over the internet, then used to clone devices with any off-the-shelf RFID encoder tool.  Read the full article here.

Leave a Reply

Close Menu

Digital Identity

107 Technology Pkwy. NW
Peachtree Corners, GA 30092
info@digmyinfo.com