News

If you’ve worked with passive RFID before, you know that most readers only work within inches of the card. In [Fran’s] DEFCON talk this summer he calls it the “ass-grabbing method” of ...
Also called an "RFID interrogator." The maximum distance between the reader's antenna and the tag vary, depending on application. Credit cards and ID badges have to be brought fairly close to the ...
An RFID asset tracking system uses a combination of tags that send radio waves and readers that pick them up, allowing businesses to track all their assets. The best asset tracking companies offer ...
RFID skimming is a form of digital theft where cybercriminals use scanners to read information stored on RFID-enabled cards, such as credit cards, IDs, and passports. These scanners can often read ...
The AI-powered Radar technology utilizes disk-shaped overhead scanners that are always on, constantly tracking garments embedded with RFID chips. Store associates receive RFID generated product ...
Bluebird Inc., a global leader in enterprise mobile solutions, has partnered with Teamwork Commerce, a leading provider of retail management software, to launch a next-generation RFID integration that ...
Phoniebox is a software suite and tutorial for building a jukebox controlled through RFID cards ... connect an NFC reader to it, wire up a pair of speakers, and you’re set.