Lysa Myers, Author at WeLiveSecurity - Page 4 of 4

Bio

Lysa Myers

Lysa Myers

Security Researcher

Education? 20 years helping – helping users, analyzing malware, talking with people implementing security technology, and testing security software.

Highlights of your career? Seeing the first few droplets before the Melissa virus storm hit, surviving the Worm Wars of 2004, my first presentation at VB in 2006, and having an article published in USA Today in 2013.

Position and history at ESET? Joined ESET: 2013. Current title: Security Researcher

What malware do you hate the most? The ExploreZip family – it overwrote files, thus destroying the data. Plenty of people lost a lot of work as a result of those outbreaks.

Favorite activities? Adventuring and whimsy-seeking.

What is your golden rule for cyberspace? An ounce of prevention is worth a pound of cure.

When did you get your first computer and what kind was it? 1981 Commodore VIC-20. And then I continued using a variety of early-80s technology until roughly 1993 (oof!).

Favorite computer game/activity? Checking my Twitter feed.

Articles by author

What is EMV, and why is it such a hot topic?

You may know it by one of many names: EMV, Integrated Chip Cards, or more simply Chip & Pin or Smart Cards… but whatever you call it: it is a hot topic for debate on the subject of credit card fraud. In this post we will explain the difference between these and traditional credit cards, and why it is being discussed so heatedly in the wake of the Target breach.

Tips for protecting against sextortion

It seems like every few days there is a new story involving teenaged girls being tricked or blackmailed into sending compromising pictures of themselves to their tormenters. For the last few years, the FBI has been warning that this crime – “Sextortion” – is on the rise.

How can we as patients secure our medical data?

When someone says “data privacy” most people think about the information that is available on sites like Google and Facebook, or stored away in some marketing database. But when it comes to very private information, there are few things most of us would be more horrified to find floating around on the Internet than our medical data.

Myths of the Target Breach

One of the realities of news that happens at Internet-speed is that it may not be wholly accurate. Much of what has come out about the Target breach contains factual errors that may not seem obvious, especially as they are repeated by many news outlets. So let us take a moment to examine some of the more common myths that have been flying around.

Why are so many kids still not receiving computer science education?

The city of Chicago recently announced a change to the curriculum for schools in their district that would introduce children as young as primary school to computer science concepts. It would also allow students to count computer science as a core subject that fulfills graduation requirements. What does this say about the current state of computer-related education?

A look back at 2013 from some folks who live security

A look back at security research highlights from 2013. ESET researchers examined everything from Java exploits to rootkits, bootkits, worms, viruses, Trojans, targeted attacks, and security initiatives. Read about malware from Hesperbot to Cryptolocker and headline security breaches like Target, all in one report.

How do we protect kids from online predators?

The Internet is a vast source of information for all of us, and naturally some people use that information for good, and some for ill, like grooming and stalking children. So what things can you as a parent, teacher, or other concerned adult do to protect kids against online predators and solicitation?

How can domestic violence survivors protect their privacy?

Domestic violence is not something that gets discussed much in information security circles, but there are few people that need advice on assuring their online safety more urgently than victims of stalking and domestic abuse. What can people do to protect themselves when there is a known and persistent threat?