St. Louis Infosec Conference: “The next time you present your phone to pay for your coffee … you might just have gotten owned,” A Keynote by Elite Hacker Charlie Miller

IT Security Professional and member of Twitter’s Product Security Team, Charlie Miller will shed light on the implications of Near Field Communication (NFC) at EC-Council’s Takedowncon IT Security event presented by Parameter Security, June 3-4, 2013.

Albuquerque, NM (PRWEB) April 11, 2013

Charlie Miller of Twitter’s Product Security Team leads the pack of notable and industry-leading speakers set to present at TakeDownCon St. Louis, EC-Council’s offensive cyber security and hacking conference. Miller was the first with a public remote exploit for both the iPhone and G1 Android phones, and is a four-time winner of the CanSecWest Pwn2Own “hacking” competition. A PhD from the University of Notre Dame, as well as an accomplished author, Charlie Miller spent five years at the NSA and has been a consultant at Accuvant Labs and Independent Security Evaluators.

His keynote, “Attacking Phones with NFC,” will describe how this fresh technology allows NFC enabled devices to communicate with each other, typically with just a few centimeters between them. “It’s a new, cool technology,” says Miller “but as with the introduction of any new technology, the question must be asked what kind of impact the inclusion of this new functionality has on the attack surface of mobile devices.” In his talk, he will both introduce NFC and its associated protocols.

Charlie Miller’s speech will begin by, “describing how to fuzz the NFC protocol stack for two devices. Then, for these devices, showing what software is built on top of the NFC stack.” Miller’s findings have shown that through NFC, using technologies like Android Beam or NDEF content sharing, one can make some phones parse images, videos, contacts, office documents or even open up web pages in the browser, all without user interaction. Some may find “Attacking Phones with NFC” to be a cautionary tale when they learn that it is possible to take over a phone completely by using NFC; this includes the possibility of stealing photos, contact, or even sending texts messages and making phone calls. Miller cautions, “the next time you present your phone to pay for your coffee, be aware – you might just have gotten owned.”

TakeDownCon St. Louis attendees can look forward to Charlie Miller, and other high-caliber speakers, in addition to industry-leading training, and hacking clinics. For more information, or to register, go to http://www.takedowncon.com/stlouis.

About TakeDownCon St. Louis & EC-Council
This highly technical IT security conference is a no-frills and topic focused conference that is targeted toward IT and security professionals of all levels. The topical theme of this unique event is broken up into two days and exposes some of the most talked-about security issues such as Web Application Security, SCADA and Critical Infrastructures, Cloud Security, Mobile Hacking and more. TakeDownCon St. Louis is organized by the International Council of E-Commerce Consultants (EC-Council), which is a member-based organization that certifies individuals in various e-business and security skills. EC Council is the owner and developer of the world-famous E-Council Certified Ethical Hacker, Computer Hacking Forensics Investigator, Certified Security Analyst, License Penetration Tester programs and various others offered in over 60 countries around the globe. For more information about EC-Council or TakeDownCon St. Louis, please visit http://www.eccouncil.org or http://www.takedowncon.com/stlouis.

About Charlie Miller:
Charlie Miller is currently on the Product Security Team at Twitter. Previously he had been a consultant at Accuvant Labs and Independent Security Evaluators. Before that, he spent five years at the NSA. He was the first with a public remote exploit for both the iPhone and the G1 Android phone. He is a four time winner of the CanSecWest Pwn2Own “hacking” competition. He has hacked batteries, Second Life, and iOS codesigning. He has authored three information security books and holds a PhD from the University of Notre Dame.


Contact

Follow us on: Contact's Facebook Contact's Twitter