Education: CISSP (1996)
Highlights of your career? The Stephen Cobb Guide to PC and LAN Security (1992); The first anti-spam router (2001); Privacy for Business (2002)
Position and history at ESET? Joined ESET: 2011. Current title: Senior Security Researcher
What malware do you hate the most? State sponsored.
Favorite activities? Reading and writing, and some arithmetic.
What is your golden rule for cyberspace? Don’t put anything on the Internet you wouldn’t want your mother to see.
When did you get your first computer and what kind was it? 1982 KayPro II portable computer with dual floppy drives, weighing 26 lbs or 12 Kg.
Favorite computer game/activity? Reading Wikipedia.
Internet surveillance by America’s National Security Agency (NSA) has been further exposed by two new developments: the analysis of leaked NSA surveillance reports and the XKeyscore targeting code. Will these stories increase the number of Internet users who say they are inclined to reduce their online engagement due to the activities of the NSA and GCHQ.
With EPIC filing an FTC privacy complaint against Facebook, which is already the subject of a Consent Order due to a previous privacy settlement, the social network could be facing a hefty fine for emotion-based manipulation of the Newsfeed for research purposes.
The top three teams from the fifth annual Mayors’ Cyber Cup will attend Cyber Boot Camp at the headquarters of ESET North America for five days of hands-on security training and lectures from IT experts, law enforcement, and career advisors.
Encryption is essential to cyber security today, with encryption of personally identifiable information (PII) being a top priority for organizations large and small, to protect customers and avoid fines and penalties after data breaches.
On the one year anniversary of Edward Snowden’s public revelations of mass surveillance conducted by the U.S. National Security Agency we look back on the impact, even as we face the prospect of more revelations to come.
FBI names as “Most Wanted” the leader of cyber criminal gang based in Russia and Ukraine responsible for both GameOver Zeus and Cryptolocker schemes, as law enforcement agencies crack down on cyber crime infrastructure.
Some users of Apple iPhones, iPads and Macs have been getting strange wake up calls and unsettling messages demanding a ransom for access to their devices. Now is the time to make your i-stuff is locked down, even if you don’t live in Australia.
Blackshades is a RAT and the FBI has just arrested a lot of people involved in its use and distribution. But what’s a RAT and how will these arrests impact cyber crime?
A reminder that malicious code can be spread via flash memory cards like SD cards, just as easily as it can spread on USB flash drives. Check these tips to get protected.
Business continuity management is the key to securing your company’s digital future despite disruptive incidents, from power outages and IT errors to fires, floods, tornadoes, earthquakes, and tsunamis.
Filing your taxes on April 15? What if someone has already filed “your” income tax return? Sadly, this can happen, and it does happen, all too often. Here’s why, and what you can do about it.
The National Security Agency (NSA) surveillance activities revealed by former CIA contractor Edward Snowden appear to be taking a serious toll on public confidence in technology companies in America, such as Internet service providers and software companies, according to a Harris poll commissioned by ESET. The poll found that two-thirds of adult Americans who said
A new Harris poll shows that revelations about the National Security Agency’s digital surveillance activities are changing online behavior for many Americans and some say they are doing less online banking and less online shopping because of what they have learned about the NSA.
Welcome to the new ESET blog: We Live Security. In fact, We Live Security is a lot more than a blog: it contains the same great content you have enjoyed on blog.eset.com, but also includes new features and a wider range of content. For example, here’s a podcast talking about the new site, one of
Could holes in security code and major information systems in America be due, at least in part, to the dire state of education in subjects like Science, Technology, Engineering, and Mathematics (STEM)?
Users of Apple iPhone and/or iPad need to install iOS 7.0.6 right away to patch a vulnerability in the SSL code that protects connections with websites and other computers. Users of Mac OS X should be on alert for a similar fix, due shortly.
The group of hackers that calls itself the Syrian Electronic Army (SEA) briefly claimed control of the facebook.com domain via an attack on MarkMonitor. It appears normal Facebook service has been resumed, but here’s what you need to know.
The Target security breach and the Snowden revelations about NSA surveillance have raised awareness of data privacy to new levels, making Data Privacy Day more relevant than ever in 2014. And yes, Data Privacy Day is a real thing, observed on January 28.
Have you been wondering what trends in security and privacy ESET researchers are predicting for 2014? The following is a sampling, a year-end snack plate if you will, featuring predictions from Aryeh Goretsky, Righard Zwienenberg, David Harley, Cameron Camp, Lysa Myers, and more.
Sign up to our newsletter
The latest security news direct to your inbox
Add this code to your site