Author
Stephen Cobb
scobb-tedx-222x179
Stephen Cobb
Senior Security Researcher
Go to latest posts

Education: CISSP (1996)

Highlights of your career? The Stephen Cobb Guide to PC and LAN Security (1992); The first anti-spam router (2001); Privacy for Business (2002)

Position and history at ESET? Joined ESET: 2011. Current title: Senior Security Researcher

What malware do you hate the most? State sponsored.

Favorite activities? Reading and writing, and some arithmetic.

What is your golden rule for cyberspace? Don’t put anything on the Internet you wouldn’t want your mother to see.

When did you get your first computer and what kind was it? 1982 KayPro II portable computer with dual floppy drives, weighing 26 lbs or 12 Kg.

Favorite computer game/activity? Reading Wikipedia.

Is the federal government doing enough to catch and prosecute computer criminals?

With ransomware running rampant we asked Americans if they thought the US federal government was doing enough to catch and prosecute computer criminals.

Network ELOFANTS and other insider threat insights from the DBIR and beyond

An ELOFANT is an “Employee Left Or Fired, Access Not Terminated” and these ghost account insiders can undermine your organization’s information security, as recent DBIR stats suggest.

What the CISSP? 20 years as a Certified Information Systems Security Professional

Reflecting on 20 years of CISSP, the Certified Information Systems Security Professional qualification from (ISC)2, the International Information System Security Certification Consortium.

GDPR Day: countdown to a global privacy and security regimen?

This thing called GDPR will impact data security and privacy policy at many US firms when it takes effect two years from today. Start learning what the EU General Data Protection Regulation means to your business.

Privacy and security fears – predictably – impact US online commerce

US government data say 45% curtail online activity due to privacy and security fears, which is sad but not surprising because we could see this coming.

Security Bulletin: Steps you should take to fix a Java SE security risk on your computer

Steps you should take to fix a Java SE security risk on your computer, a message from Oracle, broadcast by ESET, as requested by the FTC.

Data privacy and data protection: US law and legislation white paper

This white paper on data privacy and data protection law and legislation in the US should prove to be a handy reference during ongoing privacy debates.

Healthcare data breaches lead patients to withhold information from doctors

New survey suggests medical data breaches increase the number of patients who hold back information from doctors due to concerns about the security or privacy of medical records, undermining treatment.

Tax Identity Theft Awareness Week in the US

As Tax Identity Theft Awareness Week in the US gets underway, ESET’s Stephen Cobb offers expert advice on how to protect yourself from fraudsters.

What does Fitbit hacking mean for wearables and IoT?

Wearable activity tracking devices like those made by Fitbit were one of the hottest gifts this past holiday season and it appears criminal hackers were paying attention, ESET’s Stephen Cobb reports.

Wearables: where’s the security risk?

At a recent conference on “the future of wearables” I was asked to speak about security. I think my presentation surprised some people because I didn’t focus on the security of wearable devices themselves. This article summarizes what I said, with a link to my slides and some free resources you might find helpful. For

The great car hacking debate

Can cars be hacked remotely or is the idea of remotely hackable cars still only a hypothetical threat? Evidence is presented to help answer this question.

Viruses, bulletins, surveys, and gender: hashtag #VB2015

Virus Bulletin 2015 in Prague could be the biggest ever, a great place to discover the latest developments in malware protection and information security, and address issues like the infosec skills gap.

An Ashley Madison response plan: does your company have one?

The Ashley Madison data breach has created fresh cybersecurity threats for all organizations. A company response plan is needed. Here’s what you need to know.

NICE news about the cybersecurity skills shortage (and a call for papers)

The cybersecurity skills gap is a security problem and in the US the National Initiative For Cybersecurity Education (NICE) is seeking to reduce that gap.

Black Hat 2015: What to watch out for, besides cars and guns

It’s not all about crashing cars and hacking guns: what’s hot at Black Hat 2015 USA (#BHUSA) and how to get the most from the event.

Hacking Team and other breaches as security lessons learned

Recent aggressive hacks on companies underline the need for good risk analysis, situational awareness, and incident response. Just ask AshleyMadison, Hacking Team, and Sony Pictures.

Cybersecurity and manufacturers: what the costly Chrysler Jeep hack reveals

As the cost of fixing security mistakes in Jeep Chrysler Dodge vehicles mounts, so does the need for manufacturers to weigh cybersecurity risks in the product development process, alongside features and benefits.

Cybercrime update: take downs, arrests, convictions, and sentences

Information security could use some good news right now, something to offset the string of bad news about data breaches and system vulnerabilities; so how about this: “Cyber Criminal Forum Taken Down, Members Arrested in 20 Countries”.

What I learned at Cyber Boot Camp (Instructor Edition)

Teaching computer security to highly motivated students at Cyber Boot Camp reveals a lack of basic computer science education in California Schools.

Follow us

Copyright © 2016 ESET, All Rights Reserved.