Miller is famous for vulnerability research on the Mac and iOS platforms. His most famous exploit allowed an attacker to take control of an iPhone merely by sending it an SMS text message.
Miller's most recent famous hack exploited a vulnerability in NFC support on Android devices. At the Black Hat 2012 conference in Las Vegas he showed on-stage how he could take control of an Android phone by holding a malicious NFC tag in close proximity to it.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.