Author
Stephen Cobb
Stephen Cobb
Senior Security Researcher

Education: CISSP (1996)

Highlights of your career? The Stephen Cobb Guide to PC and LAN Security (1992); The first anti-spam router (2001); Privacy for Business (2002)

Position and history at ESET? Joined ESET: 2011. Current title: Senior Security Researcher

What malware do you hate the most? Reveton.

Favorite activities? Reading and writing, and some arithmetic.

What is your golden rule for cyberspace? Don’t put anything on the Internet you wouldn’t want your mother to see.

When did you get your first computer and what kind was it? 1982 KayPro II portable computer with dual floppy drives, weighing 26 lbs or 12 Kg.

Favorite computer game/activity? Reading Wikipedia.

More Info

Linux Apache malware: Why it matters to you and your business

This comprehensive look at the problems of malware on Linux Apache web servers explains the threats to business and helps you figure out if your organization is likely to be affected.

The stealthiness of Linux/Cdorked: a clarification

We clarify that the Linux/Cdorked backdoor malware leaves no traces on the hard drive “other than its modified httpd binary” which can be scanned for detection in several ways.

Beware scammers preying on Boston Marathon tragedy

In the wake of the cowardly and despicable bombings in Boston today, people who want to help need to be wary of appeals for money for victims or schemes like retweeting and “Likes” on Facebook.

Schneier, Winkler and the Great Security Awareness Training Debate

The value of educating people about cyber security is hotly debated these days, with opposing views on security awareness training coming from Bruce Schneier and Ira Winkler. Stephen Cobb weighs in.

Apple ID password and verification two-step plays on

Stepping up protection of the Apple ID falters as password reset bug emerges before two-step verification is fully implemented.

From flicks to clicks: Mac OS X Trojan Adware.Yontoo infects via fake codec

Protection and remediation tips for Mac OS X users targeted by a Trojan adware plugin called Yontoo hidden behind movie trailer and other media playing links, generating money for criminals exploiting online ad schemes.

Social media makes scams and hoaxes harder to spot

If your friend said it on Social media it must be true? Not if your friend’s acount has been hacked. We review tips for staying safe on social media.

Tax-related scams plague IRS and taxpayers

Answers to common questions about tax season scams in America and advice about fending off the malicious activity that seeks to exploit tax matters.

Android security issues: does a Microsoft Windows analogy make sense?

Malware targeting Android devices shows no signs of relenting, despite the enthusiasm of Android fans. We look at key data points and weigh risks to users.

Slides from the RSA conference: where the world talks security

Slides of ESET presentations at RSA are now available including the SMB Cyber Security Survival Guide and “What THEY want with your digital devices.”

NBC.com infected with malware for more than 24 hours?

NBC.com may have sent visitors to infected URLs serving up Trojan software (RedKit) for 24 hours. At the time of this blog post ESET researchers still see some related sites similarly compromised.

You can’t wire love (and other Valentine’s Day online romance scams)

Valentine’s Day is fast approaching and romance is in the air. Love is also blooming online, but sadly, so are romance scams. We have covered romantically-themed online scams in the past. These include attempts to spread malware through Valentine-themed links on social media, search engine poisoning, phony gift cards, and fake e-greeting cards. Today we

Straight facts about Mac malware, threats and responses

Does your Apple Mac need antivirus software, or any other kind of security software? This question has been asked repeatedly over the years and I think the “correct’ answer has changed over time.

Your Apple Mac made even safer: Part 3 of securing new devices

If you recently acquired an Apple Mac computer there are several simple steps you can take to protect your new machine, and all of the valuable information you will be storing on it.

Are fears of digital device theft justified? Survey says yes

Everybody knows that laptop computers, tablets and smartphones get stolen, and everybody reading this probably owns at least one of these digital devices, so should you be concerned about yours being pinched, pilfered, peculated, purloined, or in other words, stolen?

2013 Forecast: Malware, scams, security and privacy concerns

What does the New Year hold for information security, malicious software, consumer privacy and cybercrime? Questions of this mature are posed by journalists toward the end of every year and, beginning about November, answers from security specialists start to appear in print. Indeed, ESET researchers in Latin America published a 20-page white paper on this

The Industrialization of Malware: One of 2012′s darkest themes persists

For several years now, antivirus researchers have observed increasing efficiency and sophistication in malware development and distribution. At the start of 2012, I began using the term “industrialization of malware” to describe this phenomenon. I also drew a picture of the fictitious enterprise “Malware, Inc.” as a means of conveying the transformation that malware has

Are your USB flash drives an infectious malware delivery system?

USB flash drives continue to present a serious challenge to information security, for consumers and companies alike. You will be aware of this if you read our recent article on the Win32/Pronny worm, just one example of a piece of malicious software that is “in the wild” and actively seeking to spread via USB flash

My Little Pronny: Autorun worms continue to turn

Malware activity exploiting Autorun on Windows computers has been generating quite a few calls to ESET support lines lately, reminding us that old infection techniques seldom die and USB flash drives can still be an effective means of getting malicious code onto a computer. USB drives can be used to infect computers that automatically execute

Password handling: challenges, costs, and current behavior (now with infographic)

Online passwords are a pain, and not just when you have to type them to access your online bank account or shop at your favorite digital emporium. Password pain extends to the people who have to manage them. A few weeks ago we shared some initial findings from a recent poll of 2,129 U.S. adults

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.