Near Field Communication: What is it? What are the risks?

Near Field Communication (NFC):  Is the great convenience safe?

Near Field Communication (NFC):
Is the great convenience safe?

Image courtesy of
FrameAngel/FreeDigitalPhotos.net

With all the coolness that smartphones have to offer these days, it’s hard to imagine there’s more to come with yet-to-be added technologies.  One that’s already been on scene for a few years already is just now really getting our attention. It’s called “Near Field Communication” (NFC). Many of today’s smartphones are designed with NFC chips installed, enabling apps to act as many things, most commonly allowing them to be used as debit or credit cards for point of sale transactions. Users can do things like pay for products or services by simply waving their phone or mobile device in front of a compatible scanner. NFC-enabled devices can be held up to an ATM machine or cash register and a transaction is completed. This trend is leading towards the consolidation of everything you need to carry into one device, effectively removing the need to carry a wallet or pocketbook containing your credit or debit cards, or even cash!

NFC data exchange takes place when devices are within a few inches of each another. Like Bluetooth and Wi-Fi, NFC allows wireless communication and data exchange between digital and mobile devices. NFC enables communication with other devices or hardware that contain a near field communication tag. Users initiate the sharing of information between devices by swiping within a few inches of the two devices or by literally performing a bump. “Bump” is also the name of a popular mobile app that utilizes the NFC technology: it’s developed by Bump Technologies, Inc. The Bump app lets users share pictures, files, music, and contact information. It also lets users wirelessly share information from their mobile device with their PC. Other NFC applications in Europe allow travel papers and passports to be stored and paid for using the technology. Other uses of NFC technology include NFC-activated locks, which offer a different way to secure buildings. There are also NFC applications to facilitate emergency management.

NFC lets users obtain and exchange information with amazing ease. Neither Internet connectivity nor cellular services are needed. NFC uses electromagnetic radio fields instead of radio signals used by Wi-Fi and Bluetooth communications. This growing technology establishes a secure channel and uses encryption while sending sensitive information. The design of NFC minimizes security concerns for several reasons. First, because the signals do not carry very far, a thief would have to be in very close proximity to the smartphone transmitting the data in order to intercept the signal. Plus, the devices with NFC tags rely on the power supplied by the mobile device in order to interact. Also, the channels used for sending sensitive data are secure and the data is encrypted, which is not easy to decode, and scrambles the information for a would-be thief. Finally, smartphone manufacturers are constantly improving the cryptography and authentication protocols used in NFC-enabled devices. But in spite of all of these safety features, NFC technology is not without security risks.

EAVESDROPPING
When a third party intercepts the signal sent between two devices and gains access to the data being transmitted it is referred to as eavesdropping. It’s possible to obtain bank and credit card numbers, personal information such as driver’s license numbers, Social Security numbers, and other personal information without the owner’s knowledge or permission. The information can be obtained if a data transmission between a smartphone and a credit card reader, or between two smartphones, is intercepted. One safeguard is to encrypt the data being transferred.

DATA DISRUPTION, MODIFICATION, MANIPULATION, OR CORRUPTION
Data can be intercepted by a “man-in-the-middle” (MITM) security attack, and then read, recorded, modified, altered, or corrupted, and sent it on to the receiving party. The hacker may not intend to steal the information but might just want to stop the accurate data from reaching the intended recipient by blocking the channel. This is often referred to as a “denial of service” attack. It’s usually difficult for these types of attacks to be successful on an NFC link because of the short distance capability of the communications. A secure communication channel is the most effective way to protect against this type of attack.

VIRUSES
Mobile malware and viruses could have the ability to read nearby NFC tags and send data, such as credit card numbers, to the hackers. And as more people utilize digital wallets and NFC transactions, mobile malware and virus outbreaks will be on the rise to take advantage of the increased opportunities. Like bees to honey, the more users choose to store sensitive financial and banking information on their phones, the more those devices will be targeted by digital thieves — all with the ability to detect and steal that sensitive data.

Although less common, some attacks can cause the mobile device to crash or uncover vulnerabilities that enable and attacker to gain full control of the device.

USER SAFEGUARDS
Users can and should also take their own precautions to protect their personal information. One of the most overlooked, but probably the greatest source of vulnerability, occurs when smartphones or mobile devices are left unattended for short periods of time. That’s when information can be stolen from smartphones. A little more attention and care can go a long way to protecting your information. Some other suggestions include:

  • Password protect your smartphone and make sure your phone screen is locked when not in use. That way, if your device is ever lost, stolen, or misplaced, your information can’t be accessed and unauthorized purchases or sharing of your information can be prevented.
  • Use an additional pin or password when making any NFC transaction for increased security.
  • Don’t choose to store your username or log-in ID in apps on your mobile device.
  • Be careful when choosing which apps to download, depending on the operating system your device uses and its respective app store. Far more malicious applications are found in the Google Play store than the Apple iTunes AppStore, mostly because of the differences in app review and approval processes between the two (none vs. very stringent).
  • Use mobile antivirus software and keep it up-to-date at all times.
  • Install security apps. Some can automatically take a picture of a thief attempting to access your smartphone’s contents and either store it for you to see once the device is recovered or possibly to automatically email it to you.
  • Only open links to sites that you know are safe and trustworthy.

 

Now that you’re aware of NFC technology and the things you can do because of it, enjoy the convenience it affords us — just beware of the potential risks and exercise a bit of caution. Mobile app developers will continue to improve NFC security through their coding, development practices, and by continuously testing the security of their apps. Meanwhile, it’s widely believed that the risks of NFC technology really aren’t any greater than those associated with typical credit card transactions. So, in that case, embrace the future and swipe and bump away.

Bump ya later!

Related Resources:

The Risks of Near Field Communication

NearFieldCommunication.org

 

If you're looking for great anti-virus software that won't break the bank, try StopSign. You don't pay extra for tech support for difficult malware, and our web protection software just works. Download & install StopSign to find out why our members choose us over the other options.

Cell Phones for Teens: Smart or Dumb?

Cell Phones for Teens:  Smart or Dumb?

As parents, my wife and I recently hit a milestone. Our oldest child became a teenager last month. As we all know, your world changes when you hit “Teendom”! But as the world changes, so does the list of “Things That Change When You Become a Teenager.” One item that wasn’t on our lists when we went through this rite of passage was getting our first cell phone. A what phone? I know, right?

So here we are. Several of our son’s friends have already had their own cell phones, some for a year or two before they hit their teens. So naturally, the number one thing on our soon-to-be teen’s birthday wish list was a phone of his own.

Our first question: “Is a 13-year old mature and responsible enough for his own cell phone?” Well, we felt that he’d demonstrated the requisite responsibility and he’d patiently waited long enough. He had earned the opportunity to prove us right or wrong, as the case may be. So that decision was easy. But the questions get tougher. There are many more decisions to make, like, “what type of phone?” A smart phone or a feature (dumb) phone? Uhh…

This question raises much debate but there’s probably no one right or wrong answer. Many parents feel a child should not have a smartphone, with all its functionality, until they are of driving age. Among some of the concerns about giving your child a smartphone (at any age), include:

  • Games and apps can be addicting and discourage socialization and interaction with others. Not to mention, if that’s your child’s primary use of the smartphone, you’re paying a lot of money for a toy.
  • A lot of time spent on a smartphone can discourage a child from getting up and moving around. This lack of exercise can lead to overweight or obese children.
  • Too much time spent looking at small screens can weaken a child’s eyesight.
  • During the adolescent years, high exposure to smartphones can adversely affect brain development, possibly leading to shortened attention spans.
  • “Checking-in” publicly to places or from locations via social media platforms or apps, such as Facebook or Foursquare, can potentially jeopardize your child’s safety and security by making their whereabouts known to predators lurking online.
  • Smartphones can be used to bully other kids or lend to your child becoming the victim of cyber-bullying, whether it’s through social media platforms, texting, instant messaging, or other apps.

Many of the concerns about teens with smartphones aren’t much different from those that exist for kids with iPod Touches or other mobile Wi-Fi enabled devices, like tablets. A few differences between smartphones and iPods or tablets include costs and managing Internet access. Wi-Fi mobile devices are generally less expensive than smartphones, mainly because there is no requirement for a monthly data plan as with cell phones. Additionally, since Wi-Fi service is required, the iPods and tablets are more likely to be used at home, where parents can more closely monitor online activities.

So, if you can work through the list of cons and none of them are show stoppers for you, take a look at the convenience and accessibility that smartphones offer. Smartphones provide many advantages to parents, as well as children, including the following non-exhaustive list:

  • Parental controls are available for smartphones. Some are included in the operating system. Apple’s iOS allows you to turn on or off everything from the Safari Internet browser to YouTube to multi-player games in the Game Center. iOS restrictions also allow you to control access levels to movies, songs, and apps based on their ratings. For smartphones on other platforms like Android, the controls aren’t part of the operating system but there are several apps available for parents to control access and monitor activity.
  • Smartphones also allow you to keep tabs on your child using mobile apps and desktop programs like Google Latitude. Assuming their devices are with them, you can use smartphones to track your kids’ whereabouts at all times to make sure they are safe. This can be done without using any of the check-in services from one of the many social networking platforms. All the major wireless phone carriers have services that let you track the location of family members. There are several free apps that allow you to do this with no service fees, such as Apple’s Find My iPhone or the family app Life360 Family Locator.
  • Another benefit of smartphones is they provide access to additional learning resources, including apps for arts, math, science, spelling, foreign languages, and many more.
  • Smartphones also enable your child to easily find phone numbers or information they need online.
  • Google Navigation means your child shouldn’t get lost (or at least won’t stay lost for long).
  • Smartphone calendars can assist your child in remembering homework due dates, other important events and teach them how to manage their time and schedules.

It’s also becoming more and more difficult to find non-smartphone offerings from the phone carriers. The choices for feature phones are dwindling and the cost differences between the two types of phones are narrowing. It costs nearly as much to purchase a “dumb” phone as it does a smartphone. Pretty soon, that decision will be a moot point, as the decision will be made for you.

The bottom line is, for good or for bad, smartphone technology is here to stay. The key is to make it work for you and your family. Parental instruction and guidance about this technology are the most important parts of the equation. Establish rules and expectations for your teen’s cell phone usage and the potential consequences for failing to abide by those requirements. Clearly stating what constitutes appropriate use, as well as unacceptable activities, are important elements. Explain to your child that you want them to have the best communication tools available but that their use of them is a privilege and not a teenage right.

Formalize this notion by having a written cell phone agreement or contract that your child signs to indicate their acknowledgment of the rules, expectations, and consequences that govern their cell phone usage. Consider including stipulations in the agreement, such as a statement that they are not to share their location (aka check-in via social networking apps) with anyone other than your family and/or your tight network of friends.

Above all, don’t dread hooking your teen up. Help them get connected but do it on your terms by managing it and everything will work out just fine! How do you feel about the whole “cell phones for teens debate?” Smart or Dumb?

If you're looking for great anti-virus software that won't break the bank, try StopSign. You don't pay extra for tech support for difficult malware, and our web protection software just works. Download & install StopSign to find out why our members choose us over the other options.