Near Field Communications (NFC)

24th March 2020 | Cybrary Near Field Communications (NFC)


Near Field Communications (NFC) is a short-range wireless technology that enables simple and secure communication between electronic devices. It may be used on its own or in combination with other wireless technologies, such as Bluetooth. The communication range of NFC is between 5 and 10 centimeters, allowing devices in close proximity of each other to communicate and share data. This makes NFC ideal for secure transactions, such as contactless payments at a checkout counter. NFC is being used by Android OS devices, allowing them to connect to certain devices very easily, and to transfer data (photos, videos, document, etc) to someone easily. This is very similar to the AirDrop feature on Apple OS devices, where it can transfer data to someone else in the vicinity in seconds by using a combination of Wi-Fi and bluetooth to connect to another Apple OS device. NFC is commonly used in other places as well such as, paying a fare on public transit, checking in and checking out at a hotel, loading information about an artist or piece of art at a museum, or to unlock an NFC-enabled door lock. 

Source: TechTerms

Additional Reading: Hackers May Exploit Android NFC Beaming Vulnerability To Deliver Malware

What is NFC? Everything you need to know

Related Term: Radio Frequency Identification (RFID)

What does this mean for an SMB?

Near field communication chips are increasingly being used inside authentication devices. While physical badge access devices for building access are still dominated by RFID (Radio Frequency Identifier) technologies, computer based authentication mechanisms are on the market from vendors like Yubico’s NFC enabled authentication token. This is a great way to add a second factor to your authentication mechanisms for your smart phone or desktop computer/laptop.

To learn more about Near Field Communications, watch this short 3 minute video:

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Zero Trust RPAM: The Future of Secure Remote Access

Zero Trust RPAM: The Future of Secure Remote Access

The world of work has changed enormously since COVID-19. Gone are the days when IT admins sat behind a corporate...

Read more
Microsoft Integrates Passkeys into Windows: is this the start of a Passwordless Future?

Microsoft Integrates Passkeys into Windows: is this the start of a Passwordless Future?

Let’s be honest, who hasn’t reset a password at least once this month? For decades, passwords have been our...

Read more
When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

In a shift away from the usual “hack-meets-victim” narrative, a new kind of cyber-assault is emerging. One...

Read more