Author
Stephen Cobb
Stephen Cobb
Senior Security Researcher
Go to latest posts

Education: CISSP (1996)

Highlights of your career? The Stephen Cobb Guide to PC and LAN Security (1992); The first anti-spam router (2001); Privacy for Business (2002)

Position and history at ESET? Joined ESET: 2011. Current title: Senior Security Researcher

What malware do you hate the most? State sponsored.

Favorite activities? Reading and writing, and some arithmetic.

What is your golden rule for cyberspace? Don’t put anything on the internet you wouldn’t want your mother to see.

When did you get your first computer and what kind was it? 1982 KayPro II portable computer with dual floppy drives, weighing 26 lbs or 12 Kg.

Favorite computer game/activity? Reading Wikipedia.

Will cybercrime and other cybersecurity issues undermine the digital economy?

ESET’s Stephen Cobb looks at whether or not cybercrime and other cybersecurity issues will undermine the digital economy.

IoT of toys stranger than fiction: Cybersecurity and data privacy update

The Internet of Stranger Things came to life in the recent case of a cuddly connected toy, raising wider and deeper questions about cybersecurity, privacy, and the future of digital technology.

FTC vs. VIZIO: Getting smart about TV data collection and sharing

Is your smart TV selling data about what you watch, without asking? As the US FTC goes after one TV maker, it may be time to check.

Desperately seeking cybersecurity skills

Cybercrime is victimizing US companies and consumers, but a gap in cybersecurity skills presents a problem for the federal government. ESET’s Stephen Cobb investigates.

RoT: Ransomware of Things

Could the Internet of Things spark the Ransomware of Things? ESET’s Stephen Cobb examines how ransomware and jackware are evolving.

Amazon Echo and the Alexa dollhouses: Security tips and takeaways

Tips on securing the Alexa service on Amazon Echo devices, notably voice purchasing, a topic brought into focus by the recent “San Diego dollhouse TV story”.

FTC IoT privacy and security push points out D-Link router and webcam flaws

The US Federal Trade Commission has again acted on its serious concerns about data privacy and security in the Internet of Things (IoT). This time D-Link webcams and routers are the focus. Stephen Cobb puts this latest FTC move in context.

Year-end cybercrime update 2016: an avalanche of good news?

Highlighting 20 success stories in the struggle against cybercrime, from indictments to arrests, extraditions to sentencing. Law enforcement efforts in cyberspace may have borne more fruit in 2016 than in any other year.

Cybersecurity skills gap: It’s big and it’s bad for security

The cybersecurity skills gap is a big problem for organizations struggling to protect rapidly expanding systems from a growing range of threats. We look at how big and what to do about it.

Election hacking FAQ: 2016 US presidential election edition

Stephen Cobb, senior security researcher at ESET answers the 10 most frequently asked questions on election hacking.

10 things to know about the October 21 IoT DDoS attacks

On Friday October 21st, a series of IoT DDoS attacks caused widespread disruption of legitimate internet activity in the US. Stephen Cobb investigates.

Cybercrime in Canada: The impact on SMBs

A new survey, conducted by Ipsos and sponsored by ESET, finds that one in four Canadian SMBs with yearly revenues of $10 million or more have been hit by a cyberattack.

Snowden: 4 big security and privacy assumptions he undermined

ESET’s Stephen Cobb explains the four significant security and privacy assumptions that Snowden’s actions, and the resulting revelations, have undermined.

Jackware: When connected cars meet ransomware

Beware jackware, malicious software that seeks to take control of a device, the primary purpose of which is not data processing or digital communications.

Is the federal government doing enough to catch and prosecute computer criminals?

With ransomware running rampant we asked Americans if they thought the US federal government was doing enough to catch and prosecute computer criminals.

Network ELOFANTS and other insider threat insights from the DBIR and beyond

An ELOFANT is an “Employee Left Or Fired, Access Not Terminated” and these ghost account insiders can undermine your organization’s information security, as recent DBIR stats suggest.

What the CISSP? 20 years as a Certified Information Systems Security Professional

Reflecting on 20 years of CISSP, the Certified Information Systems Security Professional qualification from (ISC)2, the International Information System Security Certification Consortium.

GDPR Day: countdown to a global privacy and security regimen?

This thing called GDPR will impact data security and privacy policy at many US firms when it takes effect two years from today. Start learning what the EU General Data Protection Regulation means to your business.

Privacy and security fears – predictably – impact US online commerce

US government data say 45% curtail online activity due to privacy and security fears, which is sad but not surprising because we could see this coming.

Security Bulletin: Steps you should take to fix a Java SE security risk on your computer

Steps you should take to fix a Java SE security risk on your computer, a message from Oracle, broadcast by ESET, as requested by the FTC.

Follow us

Copyright © 2017 ESET, All Rights Reserved.