Education: CISSP (1996)
Highlights of your career? The Stephen Cobb Guide to PC and LAN Security (1992); The first anti-spam router (2001); Privacy for Business (2002)
Position and history at ESET? Joined ESET: 2011. Current title: Senior Security Researcher
What malware do you hate the most? State sponsored.
Favorite activities? Reading and writing, and some arithmetic.
What is your golden rule for cyberspace? Don’t put anything on the Internet you wouldn’t want your mother to see.
When did you get your first computer and what kind was it? 1982 KayPro II portable computer with dual floppy drives, weighing 26 lbs or 12 Kg.
Favorite computer game/activity? Reading Wikipedia.
Is your company ready for September 23, 2013, the deadline for compliance with HIPAA 2.0? The revised omnibus privacy and security regulations incorporating HITECH expose a lot more companies to possible fines.
What needs to happen before the President of the United States can stand before the American people and assure them that a comprehensive and good faith effort has been made to stop cyber attacks disrupting the delivery of essential goods and services? The NIST workshops are seeking answers to that question.
In the ongoing effort to protect cyber aspects of America’s critical infrastructure, the third NIST Cybersecurity Framework workshop is being hosted July 10-12, 2013 by the University of California, San Diego, and the National Health Information Sharing and Analysis Center.
Summer is here and school is out, what better time to take a look at improving the cyber protection on all of your household’s many digital devices?
Security of data in healthcare IT systems is critical to patient care and patient trust, yet on average data on 17,000 patients is exposed every day in America due to security breaches. Why is this and what does it portend for initiatives like telemedicine?
This comprehensive look at the problems of malware on Linux Apache web servers explains the threats to business and helps you figure out if your organization is likely to be affected.
We clarify that the Linux/Cdorked backdoor malware leaves no traces on the hard drive “other than its modified httpd binary” which can be scanned for detection in several ways.
In the wake of the cowardly and despicable bombings in Boston today, people who want to help need to be wary of appeals for money for victims or schemes like retweeting and “Likes” on Facebook.
The value of educating people about cyber security is hotly debated these days, with opposing views on security awareness training coming from Bruce Schneier and Ira Winkler. Stephen Cobb weighs in.
Stepping up protection of the Apple ID falters as password reset bug emerges before two-step verification is fully implemented.
Protection and remediation tips for Mac OS X users targeted by a Trojan adware plugin called Yontoo hidden behind movie trailer and other media playing links, generating money for criminals exploiting online ad schemes.
If your friend said it on Social media it must be true? Not if your friend’s acount has been hacked. We review tips for staying safe on social media.
Malware targeting Android devices shows no signs of relenting, despite the enthusiasm of Android fans. We look at key data points and weigh risks to users.
Slides of ESET presentations at RSA are now available including the SMB Cyber Security Survival Guide and “What THEY want with your digital devices.”
NBC.com may have sent visitors to infected URLs serving up Trojan software (RedKit) for 24 hours. At the time of this blog post ESET researchers still see some related sites similarly compromised.
Valentine’s Day is fast approaching and romance is in the air. Love is also blooming online, but sadly, so are romance scams. We have covered romantically-themed online scams in the past. These include attempts to spread malware through Valentine-themed links on social media, search engine poisoning, phony gift cards, and fake e-greeting cards. Today we
Does your Apple Mac need antivirus software, or any other kind of security software? This question has been asked repeatedly over the years and I think the “correct’ answer has changed over time.
If you recently acquired an Apple Mac computer there are several simple steps you can take to protect your new machine, and all of the valuable information you will be storing on it.
Sign up to our newsletter
The latest security news direct to your inbox
Add this code to your site