Carl Livitt is a Bishop Fox alumnus. He was a Principal Researcher at Bishop Fox with decades of experience in mobile and application security, hardware and embedded devices, reverse engineering, and global-scale penetration testing.
Carl is credited with the discovery of many vulnerabilities within both commercial and open-source software. He was brought in as a third-party expert to lead the team that confirmed several security issues with St. Jude Medical implantable devices. His work eventually led to an official communication from the FDA.
Carl has served as a contributing author to Hacking Exposed Web Applications 3rd Edition as well as a technical advisor for Network Security Assessment 1st Edition. He has been interviewed on NPR and quoted in publications including USA Today and eWeek. Carl co-authored the iOS reverse engineering framework iSpy, which was featured at Black Hat USA's Tools Arsenal.
May 17, 2023
A More Complete Exploit for Fortinet CVE-2022-42475
Jan 13, 2022
Creating an Exploit: SolarWinds Vulnerability CVE-2021-35211
Jan 11, 2022
Zero-Day Collaboration: Working With Imperva to Eliminate a Critical Exposure
Mar 31, 2016
On Apple, Encryption, and Privacy: A Word About Decryption
May 04, 2015
Rethinking & Repackaging iOS Apps: Part 2
Feb 24, 2015
Rethinking & Repackaging iOS Apps: Part 1
Oct 23, 2013
LinkedIn 'Intro'duces Insecurity
May 22, 2013
Guide to Hardening Your Firefox Browser in OS X
Mar 08, 2012
SSL Key Generation Weaknesses
Oct 12, 2010
Oracle WebLogic Node Manager allows arbitrary configuration via UNC path
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.