Shahmeer Amir

Shahmeer Amir
Shahmeer Amir is a world-renowned Ethical Hacker and the 3rd most accomplished bug hunter who has helped over 400 Fortune companies, including Facebook, Microsoft, Yahoo, and Twitter, resolve critical security issues in their systems. He has founded multiple entrepreneurial ventures in the field of Cyber Security, and currently leads three startups in four countries.
As the CEO of Younite, Shahmeer's premier company is working on next-generation audio-video communication technologies. He is also the CEO of Veiliux, Asia's first mainstream Cyber Security startup present in the Asia Pacific, UAE, and the UK. Authiun, another startup, is a complete passwordless authentication solution for the 21st century.
Shahmeer is the Cyber Security Advisor to the Ministry of Finance Government of Pakistan, involved in multiple projects regarding Deep Sea Tracking, Digital Transformation of Legislation, and Digitization of Pakistani Cultural Content. He is also a member of Forbes Technology Council.
As an Engineer and a Cyber Security professional with relevant certifications from renowned organizations like EC-Council, Mile2, SANS, etc., Shahmeer is currently looking at the Blockchain technology for his doctorate. He has authored three books, including Bug Bounty Hunting Essentials, and a dozen research papers.
Shahmeer is a highly sought-after keynote speaker on Cyber Security, Blockchain, and other technologies, having been invited to over 80 conferences globally. including Blackhat, GiSec, FIC, AEC Alberta, Hackfest and many more. He has also been accepted at multiple prestigious academic institutions in their entrepreneurship programs, including Stanford. As a CTO of companies, Shahmeer has learned to code in 25 languages and read code in 35, making him an expert in multiple technologies.

Talk / Workshop
Description
Talk

Breaking Barriers: A Deep Dive into Bypassing Next-Gen 2FA and MFA Security Measures

As cyberattacks become more sophisticated, companies are increasingly relying on two-factor authentication (2FA) and multi-factor authentication (MFA) to protect their assets. However, these security measures are not foolproof and can be bypassed by determined attackers. In this presentation, we will take a deep dive into the techniques used by attackers to bypass next-generation 2FA and MFA security measures.

We will begin by discussing the limitations of 2FA and MFA and why they can be vulnerable to attacks. Then we will demonstrate a variety of attacks used by attackers to bypass these security measures, including phishing attacks, man-in-the-middle attacks, and SIM swapping attacks. We will also explore more advanced techniques such as exploiting vulnerabilities in authentication protocols and exploiting weaknesses in mobile authentication applications.

Throughout the presentation, we will provide real-world examples of successful attacks that have bypassed 2FA and MFA, highlighting the impact of such attacks on businesses and organizations. We will also discuss the latest trends and developments in 2FA and MFA security and the steps organizations can take to improve their security posture.

By the end of the presentation, attendees will have a better understanding of the vulnerabilities in 2FA and MFA security measures and how attackers can exploit them. They will also gain practical knowledge and tools to help them better protect their organizations against these types of attacks.

Subscribe and get our news and updates.