Threats such as Mifare hacking, the General Data Protection regulation coming in 2016, and the need for security to integrate with other IT-based systems - these are just...
It is well known that every security method has its limits and that the effort required to crack a security pass or a transponder in an RF-based (Radio Frequency)...