Security test: Access control systems are so easy to manipulate

This weekend, we managed to uncover significant security gaps in the access cards used in a hotel. This discovery sheds light on a widespread problem: although many companies and institutions use modern card readers, they neglect to regularly update their reading procedures. Often, replacing access cards is seen as too cumbersome or costly. The result? Outdated access cards remain in use, posing significant security risks. What is particularly worrying is that these vulnerabilities can be exploited with simple means.

A good example of this is the Flipper Zero – a device that looks like a toy at first glance, but actually has impressive capabilities. With this device, outdated cards and reading methods, such as Mifare Classic, can be read and copied in just three steps. This makes it possible to gain unauthorised access to protected areas.

An investigation by FutureZone shows the extent of this problem: according to the report, 3 million doors in 16,000 buildings worldwide that use access control systems from a well-known manufacturer are affected. You can find the full article here: FutureZone article.

However, we assume that these figures are just the tip of the iceberg. The actual number of compromised access control systems is likely to be significantly higher, as the problem is not limited to hotel systems and is not exclusive to one manufacturer.

What about the security of access control systems in our company?

Companies should regularly review their security infrastructure and ensure that it is up to date. Outdated systems offer attackers an easy way to gain access. It is our responsibility to take proactive measures to ensure the security of our access control systems. It is time to identify potential security gaps and critically scrutinise the technologies used. Only through regular updates and the use of modern, secure procedures can we ensure that unauthorised persons do not gain access to sensitive areas.

Peter Dupach

Security Consultant
Peter Dupach is your contact for all aspects of planning physical security and advises our customers online and on site.

Jetzt weiterlesen!

Cyber Security, Management Consulting, Security Consulting

Security 2025: The top trends that no company can ignore

The security landscape is changing rapidly. To stay protected in the future, companies must focus on trends like OSINT, robotics, and Zero Trust by 2025. This article outlines the five key developments that you can’t ignore and a groundbreaking technology that could transform security.

Uncategorized

Deepfakes: More Than Just a Digital Facelift – A Cybersecurity Threat

I recently came across an interesting article by BlackBerry titled "Deepfakes and Digital Deception." It painted a vivid picture of the rising threat of deepfakes in the cybersecurity landscape. While deepfakes can be entertaining, their potential for malicious use is what truly caught my attention. The article effectively highlights how deepfakes, fueled by advancements in generative AI, are becoming increasingly sophisticated and accessible. This ease of creation, coupled with the persuasive power of deepfakes, makes them a potent tool for cybercriminals.

Uncategorized

EU Cyber Resilience Act: Everything you need to know

The EU Cyber Resilience Act (CRA) is a pioneering step towards greater cyber security for digital products in the European Union. This regulation defines binding security standards and protects consumers and companies from increasing cyber threats. In this article, you will learn everything you need to know about the CRA, its scope of application, the requirements and how companies can prepare themselves.

Alternativ zum Formular können Sie uns auch eine E-Mail an info@concepture.de senden.

Instead of the form, you can also send us an email to info@concepture.de.