Personal Information
Organization / Workplace
Cleveland United States
Occupation
Manager, Attack & Defense Team
Industry
Technology / Software / Internet
Website
spylogic.net
About
I focus much of my research on new and emerging technologies such as social media, advanced web application technologies and mobile device/application assessments. My research also includes developing and improving penetration testing methodologies and aligning them to industry standards. I frequently speak about my research at various user groups, businesses and national conferences including SANS, OWASP AppSec, ShmooCon, DEFCON, Black Hat USA, Black Hat Abu Dhabi, InfoSec World, Notacon, DerbyCon and ISSA summits.
Tags
pentest
hacking
security
penetrationtesting
facebook
myspace
twitter
socnetsec
socialmedia
framework
mobile
zombies
socialnetworking
bots
metasploit
apple
ios
bot
maltego
informationgathering
cyberbullying
cyberstalking
socnet
physicalsecurity
webapp
coreimpact
google
android
mobile phone
mobile computing
owasp
privacy
defcon
linkedin
kreiosc2
botnet
external
tigerteam
awareness
threats
social media
technology
money
microsoft
fraud
finance
accounting
microsoft dynamics
derbycon
socialnetworks
duckface
byod
infosec
informationsecurity
casino
smartphones
mobile application development
blackhat
penetration test
web service
webapplication
oracle
glassfish
webservices
samurai-wtf
soap
ipad2
iphone
executive
jailbreaking
ipad
notacon
gps
geotag
wireless
locations
lbs
geolocation
wifi
malware
botnets
brains
trust socialnetworks socialmedia
api
shmoocon
yahoopipes
rss
speaking
googledorks
blog
spam
media
secure
socialbutterfly
ettercap
cain
sslstrip
wireshark
fon
middler
mitm
methodology
See more
Presentations
(19)
See all
Likes
(5)
See all
EkoParty 2010: iPhone Rootkit? There's an App for that.
Eric Monti
•
12 years ago
Pentesting Mobile Applications (Prashant Verma)
ClubHack
•
11 years ago
Smart Phones Dumb Apps
Denim Group
•
12 years ago
Using Proxies To Secure Applications And More
Josh Sokol
•
14 years ago
Twitter Bots
Neil Crosby
•
15 years ago
Presentations
(19)
See all
Likes
(5)
See all
EkoParty 2010: iPhone Rootkit? There's an App for that.
Eric Monti
•
12 years ago
Pentesting Mobile Applications (Prashant Verma)
ClubHack
•
11 years ago
Smart Phones Dumb Apps
Denim Group
•
12 years ago
Using Proxies To Secure Applications And More
Josh Sokol
•
14 years ago
Twitter Bots
Neil Crosby
•
15 years ago
Personal Information
Organization / Workplace
Cleveland United States
Occupation
Manager, Attack & Defense Team
Industry
Technology / Software / Internet
Website
spylogic.net
About
I focus much of my research on new and emerging technologies such as social media, advanced web application technologies and mobile device/application assessments. My research also includes developing and improving penetration testing methodologies and aligning them to industry standards. I frequently speak about my research at various user groups, businesses and national conferences including SANS, OWASP AppSec, ShmooCon, DEFCON, Black Hat USA, Black Hat Abu Dhabi, InfoSec World, Notacon, DerbyCon and ISSA summits.
Tags
pentest
hacking
security
penetrationtesting
facebook
myspace
twitter
socnetsec
socialmedia
framework
mobile
zombies
socialnetworking
bots
metasploit
apple
ios
bot
maltego
informationgathering
cyberbullying
cyberstalking
socnet
physicalsecurity
webapp
coreimpact
google
android
mobile phone
mobile computing
owasp
privacy
defcon
linkedin
kreiosc2
botnet
external
tigerteam
awareness
threats
social media
technology
money
microsoft
fraud
finance
accounting
microsoft dynamics
derbycon
socialnetworks
duckface
byod
infosec
informationsecurity
casino
smartphones
mobile application development
blackhat
penetration test
web service
webapplication
oracle
glassfish
webservices
samurai-wtf
soap
ipad2
iphone
executive
jailbreaking
ipad
notacon
gps
geotag
wireless
locations
lbs
geolocation
wifi
malware
botnets
brains
trust socialnetworks socialmedia
api
shmoocon
yahoopipes
rss
speaking
googledorks
blog
spam
media
secure
socialbutterfly
ettercap
cain
sslstrip
wireshark
fon
middler
mitm
methodology
See more