At the Black Hat Conference in Las Vegas Wednesday, Accuvant Labs researcher Charlie Miller showed how he figured out the approach to mangle in to both the Google/Samsung Nexus S as well as Nokia N9 by equates to of the Near Field Communication (NFC) capacity in the smartphones.
RELATED: Apple bans researcher Miller for app exposing iOS confidence flaw
QUIZ: Black Hat’s many scandalous incidents
NFC is still latest though the starting to turn adopted for operate in smartphone-based purchasing in particular. The investigation that Miller did, that he demonstrated during the event, showed the probable to set up NFC-based air wave report exchnage to share calm with the smartphones to fool around tricks, such as essay an feat to pile-up phones as well as even in sure resources review files upon the phone as well as more.
I can review all the files, pronounced Miller about how he managed to mangle in to the Nokia 9 when his handcrafted NFC-based device is in unequivocally tighten vicinity to the targeted smartphone. we can have phone calls, too. Vulnerabilities he identified in the Android-powered Nexus S were located in the browser surface, he said. NFC functions during near-contact range, as well as it could not be used to conflict from any distance.
Miller pronounced his efforts concerned 9 months of investigation with NFC fuzzing techniques, as well as assistance from the expel of friends as well as associate researchers. He pronounced he skeleton to have his home-grown NFC fuzzing apparatus accessible to assistance with contrast of NFC implementations given there unequivocally arent any today.
Ellen Messmer is comparison editor during Network World, an IDG announcement as well as website, where she covers headlines as well as record trends associated to report security. Twitter: MessmerE. E-mail: email@example.com.
Read some-more about far-reaching area network in Network World’s Wide Area Network section.