Legacy credential technologies can leave organisations in a vulnerable position. RFID and key copying devices and services are becoming more accessible – a £30 card copier can spoof any credential that communicates via a 125kHz radiofrequency. Hacking tutorials are also now prevalent on YouTube and …
Tag: