Half Sized Blog Element (Single Author Style)
Half Sized Blog Element (Multi Author Style)
Attacking Proximity Card Access Systems by Brad Antoniewicz at ShmooCon 2012
From the card to the backend database, proximity card access systems contain a variety of components, all which are vulnerable to attack but have been rarely targeted. This demo-driven presentation explores and attacks each of the various components (RFID tags, controllers, and backend systems) of a popular deployment configuration.
School Bullying Outbreak
To create bully-free classrooms, it’s necessary that we educate teachers, students and parents about the prevalence and consequences of it. We all believe a school should be a safe place for the children, a place where they can learn without fear or apprehension.
Attacking Proximity Card Access Systems by Brad Antoniewicz at ShmooCon 2012
From the card to the backend database, proximity card access systems contain a variety of components, all which are vulnerable to attack but have been rarely targeted. This demo-driven presentation explores and attacks each of the various components (RFID tags, controllers, and backend systems) of a popular deployment configuration.
School Bullying Outbreak
To create bully-free classrooms, it’s necessary that we educate teachers, students and parents about the prevalence and consequences of it. We all believe a school should be a safe place for the children, a place where they can learn without fear or apprehension.

