Eoin Carroll is a Security Researcher on the McAfee Advanced Threat Research team, focused on finding new vulnerabilities in both software and hardware. For the first decade of his career he worked as an Electronic Engineer in both the semiconductor and medical device industries, gaining a wealth of engineering and risk experience.
Prior to joining McAfee ATR team he has also worked as a Software Security Engineer, Product Security Architect, Penetration Tester and Incident Responder, developing both defensive and offensive perspectives. During this time he has created and lead security teams as well as mentored many security engineers.
He is very passionate about protecting Autonomous Vehicles and Smart Cities by combining his engineering, security and researcher experience.
His work experience includes Threat Modeling and Risk, Secure Platform Design and Mitigations, Memory Forensics, Operating System Internals and Reverse Engineering.
Microsoft recently patched a critical flaw in Internet Explorer’s scripting engine that could lead to remote code execution. The vulnerability is being exploited in the wild and was originally reported by a researcher from Google’s Threat Analysis Group. Microsoft released an out-of-band patch to fix the vulnerability before the normal patch cycle. McAfee products received ...