<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ePanorama.net &#187; Cybersecurity</title>
	<atom:link href="http://www.epanorama.net/blog/category/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Fri, 08 May 2026 14:51:31 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>Cyber security news May 2026</title>
		<link>https://www.epanorama.net/blog/2026/05/03/cyber-security-news-may-2026/</link>
		<comments>https://www.epanorama.net/blog/2026/05/03/cyber-security-news-may-2026/#comments</comments>
		<pubDate>Sun, 03 May 2026 06:59:58 +0000</pubDate>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
				<category><![CDATA[Cybersecurity]]></category>

		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=199639</guid>
		<description><![CDATA[<p>This posting is here to collect cyber security news in May 2026. I post links to security vulnerability news to comments of this article. You are also free to post related links to comments. <a class="moretag" href="https://www.epanorama.net/blog/2026/05/03/cyber-security-news-may-2026/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>This posting is here to collect <a href="https://www.epanorama.net/blog/category/security/">cyber security</a> news in May 2026.</p>
<p>I post links to security vulnerability news to comments of this article.</p>
<p>You are also free to post related links to comments.</p>
<p><a href="https://openclipart.org/detail/314725/cyber-security-lock-variation-2"><img src="https://openclipart.org/image/400px/314725" width="300" height="390" class="alignnone" /></a></p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2026/05/03/cyber-security-news-may-2026/feed/</wfw:commentRss>
		<slash:comments>32</slash:comments>
		</item>
		<item>
		<title>Verisure RFID tag teardown</title>
		<link>https://www.epanorama.net/blog/2026/04/28/verisure-rfid-tag-teardown/</link>
		<comments>https://www.epanorama.net/blog/2026/04/28/verisure-rfid-tag-teardown/#comments</comments>
		<pubDate>Tue, 28 Apr 2026 16:47:44 +0000</pubDate>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Teardowns]]></category>

		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=199599</guid>
		<description><![CDATA[<p>RFID (Radio Frequency Identification) keys are widely used in modern locking and alarm systems as a secure and convenient method of access control. These keys typically come in the form of small cards, key fobs, or tags that contain an embedded microchip and antenna. When brought near an RFID reader, they transmit a unique identification <a class="moretag" href="https://www.epanorama.net/blog/2026/04/28/verisure-rfid-tag-teardown/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>RFID (Radio Frequency Identification) keys are widely used in modern locking and alarm systems as a secure and convenient method of access control. These keys typically come in the form of small cards, key fobs, or tags that contain an embedded microchip and antenna. When brought near an RFID reader, they transmit a unique identification code via radio waves, allowing the system to quickly verify whether access should be granted.</p>
<p>RFID keys are commonly used in homes, offices, hotels, and security systems, where they can be easily programmed, deactivated, or replaced. Their flexibility and reliability make RFID technology a popular choice for enhancing security and simplifying access management. An RFID system has three main parts: the key (or tag), the reader, and the control system. </p>
<p>RFID keys work by using radio waves to communicate with a reader, allowing quick and contactless identification. When you bring the RFID key close to a reader, the reader emits a low-power radio signal. In most access systems, the key is passive, meaning it doesn’t have its own battery, and it gets powered by the reader’s signal through electromagnetic induction. Once powered, the chip sends back its stored ID via radio waves. Inside the key—whether it’s a card or fob—there’s a tiny microchip attached to an antenna. This chip stores a unique identification code. </p>
<p><a href="https://www.epanorama.net/blog/wp-content/uploads/2026/04/20260425_220516.jpg"><img src="https://www.epanorama.net/blog/wp-content/uploads/2026/04/20260425_220516.jpg" alt="20260425_220516" width="4000" height="3000" class="alignnone size-full wp-image-199602" /></a></p>
<p>This image shows the &#8220;StarKey&#8221; in its assembled state.<br />
 Design: It’s designed to be rugged and waterproof. The star/flower shape in the center is the signature Verisure aesthetic.<br />
Functionality: Each tag is uniquely registered to a specific person in the household. When you tap it against the keypad, the system logs exactly who entered or left the building.</p>
<p>Pro-tip: If you ever lose one of these, you should immediately log into your Verisure app and deactivate that specific tag to ensure your home remains secure!</p>
<p>The following images provides a rare look at the internal and external design of a Verisure StarKey (specifically the RA14 model). This is a passive RFID (Radio Frequency Identification) tag used to arm or disarm Verisure alarm systems without needing a PIN code. </p>
<p><a href="https://www.epanorama.net/blog/wp-content/uploads/2026/04/20260425_220341.jpg"><img src="https://www.epanorama.net/blog/wp-content/uploads/2026/04/20260425_220341.jpg" alt="20260425_220341" width="4000" height="3000" class="alignnone size-full wp-image-199601" /></a></p>
<p>Here is a breakdown of what you are looking at: Internal Components<br />
The green circular disc is the PCB (Printed Circuit Board) that lives inside the plastic casing.<br />
The Coil (Antenna): Notice the fine copper-colored rings around the outer edge, that is the antenna for RFID signals. Since the tag has no battery, it relies on induction. When you hold it near the Verisure VoicePad or Keypad, the reader emits an electromagnetic field that &#8220;powers up&#8221; this coil.<br />
The &#8220;Blob&#8221; (Microchip): The black circular dome on the right is a &#8220;chip-on-board.&#8221; It contains the unique ID and encryption logic. It’s covered in epoxy to protect the delicate silicon wafer.<br />
RA14 Marking: This is the specific model or revision number for this generation of Verisure StarKeys.<br />
The Center Square: This area contains physical alignment guide for manufacturing and/or installinf to the casing.</p>
<p>Technical Details<br />
Frequency: These typically operate on the 13.56 MHz (NFC/High Frequency) or 125 kHz (Low Frequency) band. Given the density of the coil windings visible in your photo, it looks like a high-frequency tag designed for short-range security.<br />
Security: Unlike basic office key fobs, these use encrypted communication to prevent &#8220;cloning&#8221; (where someone could scan your pocket and copy the signal).<br />
Convenience: The main selling point for Verisure is the &#8220;SOS&#8221; integration; if an unauthorized person forces you to disarm the system, using a specific &#8220;duress&#8221; tag (or code) can silently alert the monitoring center.</p>
<p>I did some testing with NanoVNA connected to magbetic field EMC measurement probe to verify the operating frequency. My measurement shows around 14 MHz resonance frequency on NanoVNA screen. This matches pretty well to 13.5 MHz frequency tag, because taking the board out from original case and the measurement arrangement can affect it&#8217;s resonance frequency somewhat.</p>
<p><a href="https://www.epanorama.net/blog/wp-content/uploads/2026/04/20260425_225059.jpg"><img src="https://www.epanorama.net/blog/wp-content/uploads/2026/04/20260425_225059.jpg" alt="20260425_225059" width="4000" height="3000" class="alignnone size-full wp-image-199623" /></a></p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2026/04/28/verisure-rfid-tag-teardown/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cyber security news April 2026</title>
		<link>https://www.epanorama.net/blog/2026/04/02/cyber-security-news-april-2026/</link>
		<comments>https://www.epanorama.net/blog/2026/04/02/cyber-security-news-april-2026/#comments</comments>
		<pubDate>Thu, 02 Apr 2026 08:33:22 +0000</pubDate>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
				<category><![CDATA[Cybersecurity]]></category>

		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=199485</guid>
		<description><![CDATA[<p>This posting is here to collect cyber security news in April 2026. I post links to security vulnerability news to comments of this article. You are also free to post related links to comments. <a class="moretag" href="https://www.epanorama.net/blog/2026/04/02/cyber-security-news-april-2026/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>This posting is here to collect <a href="https://www.epanorama.net/blog/category/security/">cyber security</a> news in April 2026.</p>
<p>I post links to security vulnerability news to comments of this article.</p>
<p>You are also free to post related links to comments.</p>
<p><a href="https://openclipart.org/detail/314725/cyber-security-lock-variation-2"><img src="https://openclipart.org/image/400px/314725" width="300" height="390" class="alignnone" /></a></p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2026/04/02/cyber-security-news-april-2026/feed/</wfw:commentRss>
		<slash:comments>98</slash:comments>
		</item>
		<item>
		<title>GPS interference and attack drones hit Finland</title>
		<link>https://www.epanorama.net/blog/2026/03/29/gps-interference-and-attack-drones-hit-finland/</link>
		<comments>https://www.epanorama.net/blog/2026/03/29/gps-interference-and-attack-drones-hit-finland/#comments</comments>
		<pubDate>Sun, 29 Mar 2026 18:14:51 +0000</pubDate>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
				<category><![CDATA[Cybersecurity]]></category>

		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=199473</guid>
		<description><![CDATA[<p>Strong GPS interference and attack drones hit Finland today. Two drones crash in southeastern Finland in &#8216;suspected territorial violation&#8217;. Ukrainian drone crashes in southeastern Finland near Kouvola, air force confirms. The origin of other drone is not yet revealed. Fighter jets patrol southeastern Finland, as Ukraine drone strike hits Russian oil port near Finland. The <a class="moretag" href="https://www.epanorama.net/blog/2026/03/29/gps-interference-and-attack-drones-hit-finland/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>Strong <a href="https://www.epanorama.net/blog/2022/03/13/unusual-aircraft-gps-interference/">GPS interference</a> and attack drones hit Finland today. Two drones crash in southeastern Finland in &#8216;suspected territorial violation&#8217;. Ukrainian drone crashes in southeastern Finland near Kouvola, air force confirms. The origin of other drone is not yet revealed. Fighter jets patrol southeastern Finland, as Ukraine drone strike hits Russian oil port near Finland.</p>
<p>The <a href=" https://yle.fi/a/74-20217966">found Ukranian drone</a> is type <a href="https://en.wikipedia.org/wiki/Liutyi">Antonov An-196 Liutyi</a>.<br />
<a href="https://fi.wikipedia.org/wiki/An-196_Ljutyi"><img src="https://upload.wikimedia.org/wikipedia/commons/a/af/Stamp_of_Ukraine_s2081.jpg" width="588" height="397" class="alignnone" /></a></p>
<p>Here is current GPS interference map from <a href="https://gpsjam.org/">https://gpsjam.org/</a> with city of Kouvola added to it:<br />
<a href="https://www.epanorama.net/blog/wp-content/uploads/2026/03/Gemini_Generated_Image_5d10lh5d10lh5d10.png"><img src="https://www.epanorama.net/blog/wp-content/uploads/2026/03/Gemini_Generated_Image_5d10lh5d10lh5d10.png" alt="gemini_generated_image_5d10lh5d10lh5d10" width="752" height="1410" class="alignnone size-full wp-image-199481" /></a></p>
<p>Sources:<br />
<a href="https://www.euronews.com/2026/03/29/two-unidentified-drones-crash-in-southeastern-finland-in-suspected-territorial-violation">https://www.euronews.com/2026/03/29/two-unidentified-drones-crash-in-southeastern-finland-in-suspected-territorial-violation</a><br />
<a href="https://yle.fi/a/74-20217941">https://yle.fi/a/74-20217941</a><br />
<a href="https://yle.fi/a/74-20217933">https://yle.fi/a/74-20217933</a><br />
<a href="https://gpsjam.org/">https://gpsjam.org/</a><br />
<a href="https://yle.fi/a/74-20217966">https://yle.fi/a/74-20217966</a></p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2026/03/29/gps-interference-and-attack-drones-hit-finland/feed/</wfw:commentRss>
		<slash:comments>75</slash:comments>
		</item>
		<item>
		<title>Cyber Security news March 2026</title>
		<link>https://www.epanorama.net/blog/2026/03/01/cyber-security-news-march-2026/</link>
		<comments>https://www.epanorama.net/blog/2026/03/01/cyber-security-news-march-2026/#comments</comments>
		<pubDate>Sun, 01 Mar 2026 21:56:06 +0000</pubDate>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
				<category><![CDATA[Cybersecurity]]></category>

		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=199364</guid>
		<description><![CDATA[<p>This posting is here to collect cyber security news in March 2026. I post links to security vulnerability news to comments of this article. You are also free to post related links to comments. <a class="moretag" href="https://www.epanorama.net/blog/2026/03/01/cyber-security-news-march-2026/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>This posting is here to collect <a href="https://www.epanorama.net/blog/category/security/">cyber security</a> news in March 2026.</p>
<p>I post links to security vulnerability news to comments of this article.</p>
<p>You are also free to post related links to comments.</p>
<p><a href="https://openclipart.org/detail/314725/cyber-security-lock-variation-2"><img src="https://openclipart.org/image/400px/314725" width="300" height="390" class="alignnone" /></a></p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2026/03/01/cyber-security-news-march-2026/feed/</wfw:commentRss>
		<slash:comments>134</slash:comments>
		</item>
		<item>
		<title>Friday Fun: Epic FAIL</title>
		<link>https://www.epanorama.net/blog/2026/02/06/friday-fun-epic-fail/</link>
		<comments>https://www.epanorama.net/blog/2026/02/06/friday-fun-epic-fail/#comments</comments>
		<pubDate>Fri, 06 Feb 2026 20:28:45 +0000</pubDate>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Off topic fun]]></category>

		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=199149</guid>
		<description><![CDATA[<p>Cybersecurity can be a laughing matter. Epic FAIL comic strip is a new comic strip series related to cybersecurity topics is now available on-line at https://www.instagram.com/storax_ltd/ The comic can be also found at Storax homepage at https://stor.ax/epicfail/index.html <a class="moretag" href="https://www.epanorama.net/blog/2026/02/06/friday-fun-epic-fail/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>Cybersecurity can be a laughing matter. </p>
<p>Epic FAIL comic strip is a new comic strip series related to cybersecurity topics is now available on-line at<br />
<a href="https://www.instagram.com/storax_ltd/">https://www.instagram.com/storax_ltd/</a></p>
<p><a href="https://www.epanorama.net/blog/wp-content/uploads/2026/02/Screenshot_20260205_231743_Chrome.jpg"><img src="https://www.epanorama.net/blog/wp-content/uploads/2026/02/Screenshot_20260205_231743_Chrome.jpg" alt="screenshot_20260205_231743_chrome" width="1008" height="328" class="alignnone size-full wp-image-199151" /></a></p>
<p>The comic can be also found at <a href="https://stor.ax/">Storax homepage</a> at <a href="https://stor.ax/epicfail/index.html">https://stor.ax/epicfail/index.html</a></p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2026/02/06/friday-fun-epic-fail/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Cyber security news February 2026</title>
		<link>https://www.epanorama.net/blog/2026/02/02/cyber-security-news-february-2026/</link>
		<comments>https://www.epanorama.net/blog/2026/02/02/cyber-security-news-february-2026/#comments</comments>
		<pubDate>Mon, 02 Feb 2026 09:48:12 +0000</pubDate>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
				<category><![CDATA[Cybersecurity]]></category>

		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=199078</guid>
		<description><![CDATA[<p>This posting is here to collect cyber security news in February 2026. I post links to security vulnerability news to comments of this article. You are also free to post related links to comments. <a class="moretag" href="https://www.epanorama.net/blog/2026/02/02/cyber-security-news-february-2026/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>This posting is here to collect <a href="https://www.epanorama.net/blog/category/security/">cyber security</a> news in February 2026.</p>
<p>I post links to security vulnerability news to comments of this article.</p>
<p>You are also free to post related links to comments.</p>
<p><a href="https://openclipart.org/detail/314725/cyber-security-lock-variation-2"><img src="https://openclipart.org/image/400px/314725" width="300" height="390" class="alignnone" /></a></p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2026/02/02/cyber-security-news-february-2026/feed/</wfw:commentRss>
		<slash:comments>136</slash:comments>
		</item>
		<item>
		<title>Data Protection Day</title>
		<link>https://www.epanorama.net/blog/2026/01/28/data-protection-day/</link>
		<comments>https://www.epanorama.net/blog/2026/01/28/data-protection-day/#comments</comments>
		<pubDate>Wed, 28 Jan 2026 14:42:24 +0000</pubDate>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
				<category><![CDATA[Cybersecurity]]></category>

		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198992</guid>
		<description><![CDATA[<p>Data Privacy Day (or Data Protection Day in Europe) is celebrated annually on January 28 to raise awareness about the importance of respecting privacy, safeguarding data, and enabling trust. It commemorates the 1981 signing of Convention 108, the first legally binding international treaty on data protection. Key Details for 2026: Purpose: To promote best practices <a class="moretag" href="https://www.epanorama.net/blog/2026/01/28/data-protection-day/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p><a href="https://en.wikipedia.org/wiki/Data_Privacy_Day">Data Privacy Day (or Data Protection Day in Europe)</a> is celebrated annually on January 28 to raise awareness about the importance of respecting privacy, safeguarding data, and enabling trust. It commemorates the 1981 signing of Convention 108, the first legally binding international treaty on data protection. </p>
<p>Key Details for 2026:<br />
Purpose: To promote best practices for consumer privacy, educate individuals, and encourage businesses to secure personal information.<br />
Significance: It marks the anniversary of the first legally binding international treaty on data protection.<br />
Activities: Organizations hold events, webinars, and campaigns throughout late January to promote data protection.<br />
Tips for Protection: Experts advise using strong, unique passwords, enabling multi-factor authentication, updating software, and checking privacy settings on all devices. </p>
<p>The event serves as a yearly reminder for both individuals and organizations to review their data security practices. </p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2026/01/28/data-protection-day/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cyber security news January 2026</title>
		<link>https://www.epanorama.net/blog/2026/01/07/cyber-security-news-january-2026/</link>
		<comments>https://www.epanorama.net/blog/2026/01/07/cyber-security-news-january-2026/#comments</comments>
		<pubDate>Wed, 07 Jan 2026 13:06:28 +0000</pubDate>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
				<category><![CDATA[Cybersecurity]]></category>

		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198814</guid>
		<description><![CDATA[<p>This posting is here to collect cyber security news in January 2026. I post links to security vulnerability news to comments of this article. You are also free to post related links to comments. <a class="moretag" href="https://www.epanorama.net/blog/2026/01/07/cyber-security-news-january-2026/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>This posting is here to collect <a href="https://www.epanorama.net/blog/category/security/">cyber security</a> news in January 2026.</p>
<p>I post links to security vulnerability news to comments of this article.</p>
<p>You are also free to post related links to comments.</p>
<p><a href="https://openclipart.org/detail/314725/cyber-security-lock-variation-2"><img src="https://openclipart.org/image/400px/314725" width="300" height="390" class="alignnone" /></a></p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2026/01/07/cyber-security-news-january-2026/feed/</wfw:commentRss>
		<slash:comments>82</slash:comments>
		</item>
		<item>
		<title>Cyber security news December 2025</title>
		<link>https://www.epanorama.net/blog/2025/12/02/cyber-security-news-december-2025/</link>
		<comments>https://www.epanorama.net/blog/2025/12/02/cyber-security-news-december-2025/#comments</comments>
		<pubDate>Tue, 02 Dec 2025 10:18:36 +0000</pubDate>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
				<category><![CDATA[Cybersecurity]]></category>

		<guid isPermaLink="false">https://www.epanorama.net/blog/?p=198588</guid>
		<description><![CDATA[<p>This posting is here to collect cyber security news in December 2025. I post links to security vulnerability news to comments of this article. You are also free to post related links to comments. <a class="moretag" href="https://www.epanorama.net/blog/2025/12/02/cyber-security-news-december-2025/">&#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>This posting is here to collect <a href="https://www.epanorama.net/blog/category/security/">cyber security</a> news in December 2025.</p>
<p>I post links to security vulnerability news to comments of this article.</p>
<p>You are also free to post related links to comments.</p>
<p><a href="https://openclipart.org/detail/314725/cyber-security-lock-variation-2"><img src="https://openclipart.org/image/400px/314725" width="300" height="390" class="alignnone" /></a></p>
]]></content:encoded>
			<wfw:commentRss>https://www.epanorama.net/blog/2025/12/02/cyber-security-news-december-2025/feed/</wfw:commentRss>
		<slash:comments>117</slash:comments>
		</item>
	</channel>
</rss>
