Last Update

This profile was last updated on 12/5/2016 and contains contributions from the  ZoomInfo Community.

is this you? Claim your profile.

Wrong Will Dormann?

Will Dormann

Vulnerability Analyst

CERT Coordination Center

HQ Phone:  (412) 268-5800

Direct Phone: (412) ***-****direct phone

Email: w***@***.org

Get Zoominfo Grow
Community Edition

+ Get 10 Free Contacts a Month

Please agree to the terms and conditions.

I agree to the  Terms of Service and  Privacy Policy. I understand that I will receive a subscription to ZoomInfo Community Edition at no charge in exchange for downloading and installing the ZoomInfo Contact Contributor utility which, among other features, involves sharing my business contacts as well as headers and signature blocks from emails that I receive.

THANK YOU FOR DOWNLOADING!

computers
  • 1.Download
    the Plugin
    v sign
  • 2.Run Installation
    Wizard
  • 3.Check Your Inbox to
    Sign Up for ZoomInfo Community Edition

I agree to the Terms of Service and Privacy Policy. I understand that I will receive a subscription to ZoomInfo Community Edition at no charge in exchange for downloading and installing the ZoomInfo Contact Contributor utility which, among other features, involves sharing my business contacts as well as headers and signature blocks from emails that I receive.

CERT Coordination Center

4500 Fifth Avenue

Pittsburgh, Pennsylvania, 15213

United States

Company Description

CERT is an organization devoted to ensuring that appropriate technology and systems management practices are used to resist attacks on networked systems and to limiting damage and ensure continuity of critical services in spite of successful attacks, accidents...more

Find other employees at this company (160)

Background Information

Employment History

Vulnerability Analyst

Carnegie Mellon University


Web References(128 Total References)


Apple Releases QuickTime 7.6.9 Security Update | Security Generation

For Mac OS X v10.6 systems, this issue is addressed in Mac OS X v10.6.5. Credit to Nils of MWR InfoSecurity, and Will Dormann of the CERT/CC, for reporting this issue.


Who Makes the IoT Things Under Attack? - erpinnews

Which is part of the problem, says Will Dormann, senior vulnerability analyst at the CERT Coordination Center (CERT/CC).
"Even when users are interested in and looking for this information, the vendor doesn't always make it easy," Dormann said. Dormann said instead of hard-coding credentials or setting default usernames and passwords that many users will never change, hardware makers should require users to pick a strong password when setting up the device.


Who Makes the IoT Things Under Attack? - Krebs on Security

Which is part of the problem, says Will Dormann, senior vulnerability analyst at the CERT Coordination Center (CERT/CC).
"Even when users are interested in and looking for this information, the vendor doesn't always make it easy," Dormann said. Dormann said instead of hard-coding credentials or setting default usernames and passwords that many users will never change, hardware makers should require users to pick a strong password when setting up the device. Indeed, according to this post from video surveillance forum IPVM, several IoT device makers - including Hikvision, Samsung, and Panasonic - have begun to require unique passwords by default, with most forcing a mix of upper and lowercase letters, numbers, and special characters. "As long as the password can't be reversed - for example, an algorithm based off of a discoverable tidbit of information - that would be a reasonable level of security. Dormann said. "When it comes to software updates, automatic updates are good," Dormann said. Tags: CERT Coordination Center, CERT/CC, IoT, IPVM, Mirai botnet, mirai source code leak, Will Dormann This entry was posted on Monday, October 3rd, 2016 at 4:17 pm and is filed under Other.


Archives for September 2009 | Kashif Ali

Preface: unless otherwise noted, the bugs discussed here were found via fuzzing by Will Dormann of CERT -- and my involvement was to fix them.


VU#489392: Acronis True Image fails to update itself securely - Cyber Parse - Cyber Security and Information Security

This vulnerability was reported by Will Dormann of the CERT/CC.
This document was written by Will Dormann.


Similar Profiles

city

Browse ZoomInfo's Business
Contact Directory by City

city

Browse ZoomInfo's
Business People Directory

city

Browse ZoomInfo's
Advanced Company Directory