Near Field Communications (NFC)

24th March 2020 | Cybrary Near Field Communications (NFC)


Near Field Communications (NFC) is a short-range wireless technology that enables simple and secure communication between electronic devices. It may be used on its own or in combination with other wireless technologies, such as Bluetooth. The communication range of NFC is between 5 and 10 centimeters, allowing devices in close proximity of each other to communicate and share data. This makes NFC ideal for secure transactions, such as contactless payments at a checkout counter. NFC is being used by Android OS devices, allowing them to connect to certain devices very easily, and to transfer data (photos, videos, document, etc) to someone easily. This is very similar to the AirDrop feature on Apple OS devices, where it can transfer data to someone else in the vicinity in seconds by using a combination of Wi-Fi and bluetooth to connect to another Apple OS device. NFC is commonly used in other places as well such as, paying a fare on public transit, checking in and checking out at a hotel, loading information about an artist or piece of art at a museum, or to unlock an NFC-enabled door lock. 

Source: TechTerms

Additional Reading: Hackers May Exploit Android NFC Beaming Vulnerability To Deliver Malware

What is NFC? Everything you need to know

Related Term: Radio Frequency Identification (RFID)

What does this mean for an SMB?

Near field communication chips are increasingly being used inside authentication devices. While physical badge access devices for building access are still dominated by RFID (Radio Frequency Identifier) technologies, computer based authentication mechanisms are on the market from vendors like Yubico’s NFC enabled authentication token. This is a great way to add a second factor to your authentication mechanisms for your smart phone or desktop computer/laptop.

To learn more about Near Field Communications, watch this short 3 minute video:

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

CyberHoot Newsletter – June 2025

CyberHoot Newsletter – June 2025

CyberHoot June Newsletter: Stay Informed, Stay Secure Welcome to the June edition of CyberHoot’s newsletter,...

Read more
Make Phishing Training Count with HootPhish

Make Phishing Training Count with HootPhish

Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...

Read more
Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

A recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...

Read more