Video is now available of the HID access card spoofing device. As promised, InfoWorld has posted a demonstration of the RFID card clone device from IOActive that allows anyone to passively read, store and clone HID-brand access cards. As TechWatch blogged on Monday, IOActive had this device on display at the RSA Conference in San Francisco last week. The video, available here, shows Chris Paget, IOActive’s director of R&D showing how the device can be used to grab access codes from a HID card, then store them on the device and play them back, tricking a HID card reader into thinking that a valid card has been presented. As I noted in my blog, Paget’s device was able to clone the HID card in the video, but also my HID building access card for IDG’s offices on 2nd street. So, while its not clear that every HID card is vulnerable to this kind of attack, we might presume that quite a few are. Advice: beware of strangers sprouting antenna! Security