How goes the switch to Chip & Signature cards in the US?
With the deadline for the switchover now just months away, how are vendors doing? Have they begun the conversion already, or will they likely be scrambling at the last minute?
Education? 20 years helping – helping users, analyzing malware, talking with people implementing security technology, and testing security software.
Highlights of your career? Seeing the first few droplets before the Melissa virus storm hit, surviving the Worm Wars of 2004, my first presentation at VB in 2006, and having an article published in USA Today in 2013.
Position and history at ESET? Joined ESET: 2013. Current title: Security Researcher
What malware do you hate the most? The ExploreZip family – it overwrote files, thus destroying the data. Plenty of people lost a lot of work as a result of those outbreaks.
Favorite activities? Adventuring and whimsy-seeking.
What is your golden rule for cyberspace? An ounce of prevention is worth a pound of cure.
When did you get your first computer and what kind was it? 1981 Commodore VIC-20. And then I continued using a variety of early-80s technology until roughly 1993 (oof!).
Favorite computer game/activity? Checking my Twitter feed.
With the deadline for the switchover now just months away, how are vendors doing? Have they begun the conversion already, or will they likely be scrambling at the last minute?
Lysa MyersThe pressure for businesses to allow their employees to access work resources with their personal mobile devices may be overwhelming. How can healthcare IT and Security staff implement this without giving criminals the keys to the castle?
Lysa MyersCriminals are targeting medical records because of their value, and as a result, medical breaches are the fastest growing type of breach. What can healthcare businesses do to get themselves out of the crosshairs?
Lysa MyersWhile there may still be only a handful of women in Information Security, they can be found in increasing numbers in important, high-profile positions. In this post we look at how three women in Federal cybersecurity got their start.
Lysa MyersOne of the terms I’m most often asked to explain is what a “zero day” vulnerability or exploit is; let’s look at what that phrase entails.
Lysa MyersThis has not been a great week for Adobe; they have been scrambling to fix a number of critical vulnerabilities in their Flash Player product that are being used in active attacks. But a patch is now available to cover all these vulnerabilities - so patch now!
Lysa MyersYesterday the Anthem breach, the biggest healthcare-related breach to date was announced, as attackers accessed a database containing the records of current and former employees. As we discussed earlier this morning on We Live Security, this could affect as many as 80 million people.
Lysa MyersSince the discovery of Stuxnet several years ago, there has been a parade of targeted malware that may have been created or sponsored by nation states. Does an average person or business really need to worry about these things?
Lysa MyersTips for safe holiday shopping: whether you shop online or at the mall, there are some simple strategies that can protect your bank accounts and payment cards against criminal hackers and scammers.
Lysa MyersAn army of the undead, wreaking havoc on the Internet – it's a nightmare scenario that has played out many times as the population of humans online has exploded. Some zombie plagues have been particularly troubling, and we will take a look at the worst of the worst.
Lysa MyersOn the one hand, the breach of JP Morgan Chase is not as bad as it could have been. But how do you measure relative “badness” of a breach?
Lysa MyersHome Depot has issued a statement today that provides more details about their recent breach, as well as indicating that the malware used by the attackers has now been removed from their systems. This breach appears to be even larger than Target’s, as it exposed payment information for 56 million customers in their US and Canada locations.
Lysa MyersThis week is National Health IT Week, and you may be wondering – what is the best way to observe this occasion? While planning for catastrophe may not seem the most celebratory activity, this week is a great occasion to start or review your organization’s risk assessment.
Lysa MyersYoung people are targeted for data theft at 35 times the rate of adults – they are considered an easy target for both digital and physical theft. You can make going back to school an easier transition by ensuring your data and devices are secure both at school and at home.
Lysa MyersNew malware targeting point of sale (PoS) systems, detected by ESET as Win32/Spy.Agent.OKG is described in a warning and analysis distributed by US-CERT, a reminder to increase security around PoS access.
Lysa MyersCriminals are very interested in retailers’ Point of Sale (PoS) machines. Recently, a new type of malware has been found that specifically tries to break into PoS machines, called Win32/BrutPOS.A.
Lysa MyersGraduation is a great time to review your social media profile. Don't let a wild and crazy social network presence undermine the promise of graduation, your chances for a scholarship, job, internship or other career choices.
Lysa MyersAs the 145 million people affected by the security breach at online giant eBay get used to the idea that their personal information may be "out there" and their passwords need to be changed, we wanted to update yesterday's coverage of the story.
Lysa MyerseBay customers should change passwords following this latest high profile breach. The Internet giant says the hack exposed names, addresses, phone numbers, and encrypted passwords of customers.
Lysa MyersThere has been a lot of talk in the news lately of a new ransomware for Android. While this does sound dire, and the possibility exists for more problematic threats on Androids in the future, it is not yet time to panic.
Lysa MyersWhen it comes to identity theft, the most successful attack is on the person least likely to be aware of activity being carried out in his or her name. That being the case, it is hard to imagine anyone who better fits the bill than a child.
Lysa MyersOne of the realities of news that happens at Internet-speed is that it may not be wholly accurate. Much of what has come out about the Target breach contains factual errors that may not seem obvious, especially as they are repeated by many news outlets. So let us take a moment to examine some of the more common myths that have been flying around.
Lysa MyersThe city of Chicago recently announced a change to the curriculum for schools in their district that would introduce children as young as primary school to computer science concepts. It would also allow students to count computer science as a core subject that fulfills graduation requirements. What does this say about the current state of computer-related education?
Lysa Myers11 things you can be doing to better protect your computers and data from ransomware such as Cryptolocker that is currently targeting businesses big and small.
Lysa MyersThe Internet is a vast source of information for all of us, and naturally some people use that information for good, and some for ill, like grooming and stalking children. So what things can you as a parent, teacher, or other concerned adult do to protect kids against online predators and solicitation?
Lysa MyersDomestic violence is not something that gets discussed much in information security circles, but there are few people that need advice on assuring their online safety more urgently than victims of stalking and domestic abuse. What can people do to protect themselves when there is a known and persistent threat?
Lysa Myers