After connecting you need to open the "Scripts" menu, select "Set playback location consumer email list and specify your iPhone; then select the connected device from the list and uncheck the box "Ask when performing". The procedure will have to be repeated with each device. In the early s, NFC modules were considered invulnerable to hackers. of theoretical attacks that could be used to steal information and infect a smartphone with a virus. In , the first critical NFC vulnerability was identified . At that time, MWR Labs demonstrated the process of transmitting a virus, infecting a device, and taking full control of a smartphone in just five minutes.

To do this it was enough to bring the device to a label containing malicious code. To date, NFC signals are encrypted using cryptographic algorithms, and in parallel, new encryption protocols are being developed. In addition, in mobile applications of banks, payments usually need to be additionally confirmed with a PIN code, a fingerprint or a picture of the iris. However, experts recommend following the rules: Make contactless payments in verified places: at gas stations, supermarkets, cafes and shopping centers. Do not bring your smartphone near NFC tags located in public places, including advertisements. When using an NFC-enabled self-service terminal.