• Home
  • My articles
    • 5G, Edge, mIoT Technology Primer
    • 5G, Edge, mIoT Cybersecurity
    • Geopolitics of 5G and Emerging Tech
    • 5G, Edge, Telecom Business and Policy
    • Society 5.0 & Smart-Everything World
    • Cyber-Kinetic Security
    • Canada 5G and Emerging Tech
    • 5G, Edge, mIoT Privacy
    • AI in 5G and Edge
  • Resources
    • Internet of Things (IoT) Wireless Protocols
    • Emerging Tech Security Guidelines, Frameworks, Standards
    • Timeline of Key Cyber-Kinetic Attacks, Incidents & Research
  • About
    • About 5G.Security
    • Contact
Search
Sign in
Welcome! Log into your account
Forgot your password? Get help
Password recovery
Recover your password
A password will be e-mailed to you.
5G.Security Marin Ivezic 5G.Security Marin Ivezic 5G Security by Marin Ivezic
  • Home
  • My articles
    • 5G, Edge, mIoT Technology Primer
    • 5G, Edge, mIoT Cybersecurity
    • Geopolitics of 5G and Emerging Tech
    • 5G, Edge, Telecom Business and Policy
    • Society 5.0 & Smart-Everything World
    • Cyber-Kinetic Security
    • Canada 5G and Emerging Tech
    • 5G, Edge, mIoT Privacy
    • AI in 5G and Edge
  • Resources
    • Internet of Things (IoT) Wireless Protocols
    • Emerging Tech Security Guidelines, Frameworks, Standards
    • Timeline of Key Cyber-Kinetic Attacks, Incidents & Research
  • About
    • About 5G.Security
    • Contact
Home Research - Researcher Defeats Key Card Locks

    Research – Researcher Defeats Key Card Locks

    By
    Marin Ivezic
    -
    November 19, 2017
    Hotel Lock Cyber-Kinetic

    At the Black Hat security conference in Las Vegas developer Cody Brocious demonstrates a hack of key card locks that are in use in four million hotel rooms.

    Hotel Lock Cyber-Kinetic
    Previous articleResearch – Tests of Insulin Pumps
    Next articleResearch – Tests of Traffic System Vulnerabilities
    Marin Ivezic
    5G mIoT Security Marin Ivezic
    ABOUT US
    5G.Security is Marin Ivezic's personal blog. With guest contributors. I write about cybersecurity, cyber-kinetic security, privacy and geopolitics of emerging technologies, 5G and 5G-connected connected cyber-physical infrastructure such as massive internet of things (mIoT), critical internet of things (cIoT), industrial internet of things (IIoT), industrial control systems (ICS), robotics, critical national infrastructure (CNI), connected and autonomous transportation and smart cities.
    Contact us: [email protected]
    FOLLOW US
    • Home
    • My articles
      • 5G, Edge, mIoT Technology Primer
      • 5G, Edge, mIoT Cybersecurity
      • Geopolitics of 5G and Emerging Tech
      • 5G, Edge, Telecom Business and Policy
      • Society 5.0 & Smart-Everything World
      • Cyber-Kinetic Security
      • Canada 5G and Emerging Tech
      • 5G, Edge, mIoT Privacy
      • AI in 5G and Edge
    • Resources
      • Internet of Things (IoT) Wireless Protocols
      • Emerging Tech Security Guidelines, Frameworks, Standards
      • Timeline of Key Cyber-Kinetic Attacks, Incidents & Research
    • About
      • About 5G.Security
      • Contact
    © Marin Ivezic All rights reserved | Terms of Use | Privacy Policy