The researchers showed how to get round the limited computational abilities of the smart tags to use them as an attack vector and corrupt databases holding information about what a company has in storage.
BBC: NEWS | Technology | Viruses leap to smart radio tags