Need more? Try out  Advanced Search (20+ criteria)»

logo

Last Update

This profile was last updated on 7/11/2014 and contains contributions from the  Zoominfo Community.

is this you? Claim your profile.

Wrong Mark Yason?

Mark Vincent Yason

Security Researcher On Research Team

X-Force

GET ZOOMINFO GROW

+ Get 10 Free Contacts a Month

Please agree to the terms and conditions.

I agree to the  Terms of Service and  Privacy Policy. I understand that I will receive a subscription to ZoomInfo Grow at no charge in exchange for downloading and installing the ZoomInfo Contact Contributor utility which, among other features, involves sharing my business contacts as well as headers and signature blocks from emails that I receive.

THANK YOU FOR DOWNLOADING!

computers
  • 1.Download
    ZoomInfo Grow
    v sign
  • 2.Run Installation
    Wizard
  • 3.Check your inbox to
    Sign in to ZoomInfo Grow

I agree to the Terms of Service and Privacy Policy. I understand that I will receive a subscription to ZoomInfo Community Edition at no charge in exchange for downloading and installing the ZoomInfo Contact Contributor utility which, among other features, involves sharing my business contacts as well as headers and signature blocks from emails that I receive.

X-Force

Background Information

Employment History

Internet Security Systems Researcher

IBM Corporation


Web References(16 Total References)


whackhack.com

This vulnerability was discovered by Mark Vincent Yason who is a security researcher at IBM's X-Force Advanced Research team and found that WinRT PDF can be leveraged in the same way as in Flash or Java to conduct drive-by attacks.


www.blackhat.com [cached]

Mark Yason
Mark Yason IBM Mark Vincent Yason is a security researcher on IBM's X-Force Advanced Research team. Mark's current focus area is vulnerability and exploit research - he analyzes known vulnerabilities, discovers new vulnerabilities, studies exploitation techniques, and creates detection guidance/algorithms which are used in the development of IDS/IPS signatures. He also previously worked on malware research which naturally involved some degree of software protection research. He authored the paper The Art of Unpacking and co-authored the paper Reversing C++, both of which were previously presented at BlackHat.


www.blackhat.com [cached]

Mark Vincent Yason
Mark Vincent Yason is a security researcher on IBM's X-Force Advanced Research team. Mark's current focus area is vulnerability and exploit research -he analyzes known vulnerabilities, discovers new vulnerabilities, studies exploitation techniques, and creates detection guidance/algorithms which are used in the development of IDS/IPS signatures. He also previously worked on malware research which naturally involved some degree of software protection research. He authored the paper "The Art of Unpacking" and co-authored the papers "Reversing C++" and "Playing In The Reader X Sandbox", all of which were previously presented at BlackHat.


securityintelligence.com

By Mark Yason
Mark Yason Security Researcher, IBM X-Force Follow Mark Yason Mark Vincent Yason is a security researcher on IBM's X-Force Advanced Research team. Mark's current focus area is vulnerability and exploit research - he analyzes known... See All Posts Hi Everyone, Mark Yason here from IBM X-Force.


blogs.iss.net [cached]

Finally, I'd like to take this opportunity to share with our readers that a Remote Code Execution vulnerablity in QuickTime found by X-Force Researcher, Mark Yason, has been patched.
Click for the IBM X-Force advisory.


Similar Profiles

city

Browse ZoomInfo's Business
Contact Directory by City

city

Browse ZoomInfo's
Business People Directory

city

Browse ZoomInfo's
Advanced Company Directory