Computer scientists address gap in messaging privacy — University of Birmingham — “With current end-to-end encryption, if an attacker compromises a recipient’s device, they can then put themselves in a position to intercept, read and alter all future communications without sender or recipient ever knowing. The new protocol, published in IEEE Transactions on Information Forensics and Security, forces attackers to leave evidence of any such activity and alerts users to take action.”
- Bank of China lets taxi drivers accept central bank digital currency payments on NFC mobile phones
- Juniper forecasts 25% increase in POS terminal transaction values by 2028
- STMicroelectronics launches NFC tag chip with elliptic curve cryptography
- NFC Forum survey finds majority of consumers now prefer making payments with their mobile phone
- Hello, NFCW readers!