Education: CISSP (1996)
Highlights of your career? The Stephen Cobb Guide to PC and LAN Security (1992); The first anti-spam router (2001); Privacy for Business (2002)
Position and history at ESET? Joined ESET: 2011. Current title: Senior Security Researcher
What malware do you hate the most? State sponsored.
Favorite activities? Reading and writing, and some arithmetic.
What is your golden rule for cyberspace? Don’t put anything on the internet you wouldn’t want your mother to see.
When did you get your first computer and what kind was it? 1982 KayPro II portable computer with dual floppy drives, weighing 26 lbs or 12 Kg.
Favorite computer game/activity? Reading Wikipedia.
Is your smart TV selling data about what you watch, without asking? As the US FTC goes after one TV maker, it may be time to check.
Tips on securing the Alexa service on Amazon Echo devices, notably voice purchasing, a topic brought into focus by the recent “San Diego dollhouse TV story”.
The US Federal Trade Commission has again acted on its serious concerns about data privacy and security in the Internet of Things (IoT). This time D-Link webcams and routers are the focus. Stephen Cobb puts this latest FTC move in context.
Highlighting 20 success stories in the struggle against cybercrime, from indictments to arrests, extraditions to sentencing. Law enforcement efforts in cyberspace may have borne more fruit in 2016 than in any other year.
The cybersecurity skills gap is a big problem for organizations struggling to protect rapidly expanding systems from a growing range of threats. We look at how big and what to do about it.
Stephen Cobb, senior security researcher at ESET answers the 10 most frequently asked questions on election hacking.
On Friday October 21st, a series of IoT DDoS attacks caused widespread disruption of legitimate internet activity in the US. Stephen Cobb investigates.
ESET’s Stephen Cobb explains the four significant security and privacy assumptions that Snowden’s actions, and the resulting revelations, have undermined.
With ransomware running rampant we asked Americans if they thought the US federal government was doing enough to catch and prosecute computer criminals.
An ELOFANT is an “Employee Left Or Fired, Access Not Terminated” and these ghost account insiders can undermine your organization’s information security, as recent DBIR stats suggest.
Reflecting on 20 years of CISSP, the Certified Information Systems Security Professional qualification from (ISC)2, the International Information System Security Certification Consortium.
US government data say 45% curtail online activity due to privacy and security fears, which is sad but not surprising because we could see this coming.
Steps you should take to fix a Java SE security risk on your computer, a message from Oracle, broadcast by ESET, as requested by the FTC.
This white paper on data privacy and data protection law and legislation in the US should prove to be a handy reference during ongoing privacy debates.
New survey suggests medical data breaches increase the number of patients who hold back information from doctors due to concerns about the security or privacy of medical records, undermining treatment.
Sign up to our newsletter
The latest security news direct to your inbox
Add this code to your site