Researchers from Radboud University in the Netherlands have successfully cracked the security of the Oyster card used for fare payments on buses and tubes in London.
The researchers travelled on the tube on a cloned card, reset its credit level from a laptop and caused gates to jam closed.
Transport for London (TfL) said that its Oyster cards are secure, that personal information is kept separate from journey information and that anyone caught using a cloned card would be prosecuted.
The system is checked every 24 hours and the best any Oyster criminal could get is a day's free travel, the company claimed.
Radboud researcher Wouter Teepe presented evidence on the crack to the Dutch parliament, which has already delayed installation of a €1bn automated payment transport system based on the same core technology.
At the heart of an Oyster card is the Mifare chip, made by Philips spin-off NXP.
Designed in the 1990s before processors of that size could handle strong encryption, Mifare has suffered at least three published cracks, according to security experts who have urged TfL to upgrade the system.
The new processors support Intel's Optane memory acceleration technology
Blockchain's killer app is bitcoin, the rest is mostly 'pure marketing', says MaidSafe's David Irvine
Blockchains are not suited to many of the data security purposes being put forward for them
Applications from some member states were down more than 40 per cent
A new RSA report urges coders to sign a 'Hippocratic Oath' before embarking on AI programmes.