Securing mobile devices that access the corporate network is hard enough, but now I'm reading about all of the...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
security holes with the near field communication (NFC) technology that is built in to many of these newer devices. Are there any methods enterprises can use to secure NFC in mobile devices? Should we just consider banning such devices in BYOD security policies?
Ask the expert
Have questions about enterprise information security threats for expert Nick Lewis? Send them via email today! (All questions are anonymous.)
Charlie Miller's security research for Accuvant Labs details the many vulnerabilities he found in NFC implementations. These vulnerabilities allowed him to access photos, send text messages, make calls and browse the Internet. If an attacker is able to force access to the Internet over NFC, they could potentially root the phone. The security risk from NFC attacks could be minimized by using an app that only enables the feature for a short period when its use is absolutely necessary. Keeping mobile devices updated with the most recent patches also helps reduce any NFC security risks, but, of course, this depends on the wireless carrier ecosystem used to deploy the patches.
In most environments, banning any device as a part of a BYOD policy would be impossible to do consistently. If a company has the sufficient resources and enough control to search everyone who enters your buildings or check the configuration of all devices connecting to your systems or network, it might be possible.
Many enterprises have fretted over any new wireless technology that they don't think they can fully control, including WiFi, Bluetooth, RFID and now NFC. Enterprise fears over wireless security even created a market for anti-WiFi paint, so special phone cases that block NFC are probably the next cell phone accessory to be marketed along with RFID blockers. For some enterprises, security concerns over NFC technology are legitimate, but for the majority of enterprises that don't have such stringent security requirements, worrying about NFC may not be a good use of information security resources.
Dig Deeper on BYOD and mobile device security best practices
Related Q&A from Nick Lewis
The Fruitfly Mac malware has decades-old code, but has been conducting surveillance attacks for over two years without detection. Expert Nick Lewis ...continue reading
A Gmail phishing attack brought users to fake login pages designed to look like Google's. Expert Nick Lewis explains how users can prevent similar ...continue reading
A HummingBad malware variant, HummingWhale, was discovered being spread through 20 apps on the Google Play Store. Expert Nick Lewis explains the ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.