Near Field Communications (NFC)

24th March 2020 | Cybrary Near Field Communications (NFC)


Near Field Communications (NFC) is a short-range wireless technology that enables simple and secure communication between electronic devices. It may be used on its own or in combination with other wireless technologies, such as Bluetooth. The communication range of NFC is between 5 and 10 centimeters, allowing devices in close proximity of each other to communicate and share data. This makes NFC ideal for secure transactions, such as contactless payments at a checkout counter. NFC is being used by Android OS devices, allowing them to connect to certain devices very easily, and to transfer data (photos, videos, document, etc) to someone easily. This is very similar to the AirDrop feature on Apple OS devices, where it can transfer data to someone else in the vicinity in seconds by using a combination of Wi-Fi and bluetooth to connect to another Apple OS device. NFC is commonly used in other places as well such as, paying a fare on public transit, checking in and checking out at a hotel, loading information about an artist or piece of art at a museum, or to unlock an NFC-enabled door lock. 

Source: TechTerms

Additional Reading: Hackers May Exploit Android NFC Beaming Vulnerability To Deliver Malware

What is NFC? Everything you need to know

Related Term: Radio Frequency Identification (RFID)

What does this mean for an SMB?

Near field communication chips are increasingly being used inside authentication devices. While physical badge access devices for building access are still dominated by RFID (Radio Frequency Identifier) technologies, computer based authentication mechanisms are on the market from vendors like Yubico’s NFC enabled authentication token. This is a great way to add a second factor to your authentication mechanisms for your smart phone or desktop computer/laptop.

To learn more about Near Field Communications, watch this short 3 minute video:

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Why Hackers Love MSPs and What We’re Gonna Do About It

Why Hackers Love MSPs and What We’re Gonna Do About It

"Being an MSP today is like wearing a neon sign that says, ‘Hack me! I’m the gateway to 100...

Read more
Stop the Swap: How to Protect Yourself from SIM Swapping Attacks

Stop the Swap: How to Protect Yourself from SIM Swapping Attacks

Ever had your phone suddenly lose service for no reason, followed by a flood of “reset your password”...

Read more
Your WiFi Might Be Watching You… Sort Of

Your WiFi Might Be Watching You… Sort Of

As smart homes get smarter, so do their habits of watching, sensing, and reporting. Enter WiFi Motion Detection, a...

Read more