With a simple hack and minimal equipment, a security researcher demonstrates how easily thieves can make your data their own. It’s been known for some time that there are security issues associated with the increasing use of RFID tags in credit cards, but this past weekend afforded a fresh demonstration of just how easy it is for hackers to take advantage of them.Onstage at the Shmoocon hacker conference in Washington, D.C., Recursion Ventures security researcher Kristin Paget used about $350 in equipment to wirelessly read a volunteer’s RFID-enabled credit card and then encode its key data onto a blank card, as described Monday by Forbes.Next, she used the fraudulent card and a Square Card Reader to make a payment to herself.‘Embarrassingly Simple’ Elaborate trick? Far from it: “This is an embarrassingly simple hack, but it works,” Paget told Forbes.Essentially, it’s possible because much the way the store’s point-of-sale device reads the data on a contactless card wirelessly, so, too, can pretty much any RFID reader–through standard wallets and clothing, and regardless of the encryption or security measures that are in place, Paget said. Today’s contactless cards don’t make the user’s name, PIN, or permanent three-digit CVV code wirelessly available, the report notes; they also use a one-time CVV code with each scan so as to prevent repeated fraudulent use. In six years of use, there reportedly haven’t been any documented cases of this kind of fraud, either.Still, Paget’s demonstration shows how easy it would be for one or more hackers to scan numerous victims’ cards, even just to use each of them once.Three Seconds on ‘High’So what can you do to protect yourself and your business?First, determine if any of your cards are RFID-enabled. PayPass and payWave, for example, are two of the leading names under which this technology is offered in the United States.Assuming you do have one, there are a few steps you can take to protect it. Among the more drastic options, certainly, is toasting your RFID chip in the microwave–three seconds will kill it, Paget reportedly told Forbes. Of course, then you can kiss your contactless payment capabilities goodbye as well. Duct Tape and Aluminum FoilRecursion Ventures, meanwhile, is reportedly working on a high-powered protection device for RFID-enabled credit cards, but it’s still in the prototype stages.In the meantime, you could try one of today’s RFID-blocking shields or wallets, which generally use aluminum or steel to keep out prying eyes. There are even instructions on the Web for how to give your existing wallet RFID-inhibiting protection using just duct tape and aluminum foil.Though by no means invincible, steps like these may be your best bet for now, short of locking your card up in a safe place. Related content news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Advanced Persistent Threats Cyberattacks feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Security Monitoring Software Data and Information Security feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe