Submitted via IRC for AndyTheAbsurd
Google patched last month an Android bug that can let hackers spread malware to a nearby phone via a little-known Android OS feature called NFC beaming.
NFC beaming works via an internal Android OS service known as Android Beam. This service allows an Android device to send data such as images, files, videos, or even apps, to another nearby device using NFC (Near-Field Communication) radio waves, as an alternative to WiFi or Bluetooth.
Typically, apps (APK files) sent via NFC beaming are stored on disk and a notification is shown on screen. The notification asks the device owner if he wants to allow the NFC service to install an app from an unknown source.
But, in January this year, a security researcher named Y. Shafranovich discovered that apps sent via NFC beaming on Android 8 (Oreo) or later versions would not show this prompt. Instead, the notification would allow the user to install the app with one tap, without any security warning.
Source: https://www.zdnet.com/article/android-bug-lets-hackers-plant-malware-via-nfc-beaming/
(Score: 0) by Anonymous Coward on Tuesday November 05 2019, @07:28PM
NFC stands for Near Field Communication, and as the name implies it provides a wireless communication mechanism between two compatible devices.
NFC is a short range wireless technology having a range of 4cm or less for two devices to share data.
The transmission frequency for data across NFC is 13.56 megahertz, and data can be sent at either 106, 212 or 424 kilobits per second,
which is quick enough for a range of data transfers from contact details to swapping pictures, songs and videos.
Same freq as RFID tags.