Stephen Cobb

Stephen Cobb

Senior Security Researcher


Education: Master of Science in Security and Risk Management, University of Leicester, UK

Highlights of your career? The Stephen Cobb Guide to PC and LAN Security (1992); The first anti-spam router (2001); Privacy for Business (2002); TEDx talk (2015)

Position and history at ESET? Joined ESET: 2011. Current title: Senior Security Researcher

What malware do you hate the most? State sponsored.

Favorite activities? Reading and writing, and some arithmetic.

What is your golden rule for cyberspace? Don’t put anything on the internet you wouldn’t want your mother to see.

When did you get your first computer and what kind was it? 1982 KayPro II portable computer with dual floppy drives, weighing 26 lbs or 12 Kg.

Favorite computer game/activity? Reading Wikipedia.


224 articles by Stephen Cobb

RSA 2018: Behind the lines

RSA 2018: Behind the lines

RSA 2018: Behind the lines

ESET's Senior Security Researcher Stephen Cobb reflects on RSA 2018 and the state of the cybersecurity industry

Stephen Cobb27 Apr 20185 min. read


Less Technical

The 5 IT security actions to take now based on 2018 Trends

The 5 IT security actions to take now based on 2018 Trends

Less Technical

The 5 IT security actions to take now based on 2018 Trends

Implementing the five actions described in this article can help reduce your organization's cyber risk and bolster its security defenses

Stephen Cobb04 Apr 20189 min. read


Privacy

Data Privacy vs. Data Protection: Reflecting on Privacy Day and GDPR

Data Privacy vs. Data Protection: Reflecting on Privacy Day and GDPR

Privacy

Data Privacy vs. Data Protection: Reflecting on Privacy Day and GDPR

Data privacy is also a topic that can spark big debates, like the one between the US and the EU as to what protections should be accorded to data pertaining to people, specifically by those who collect, control, or process such data.

Stephen Cobb25 Jan 20189 min. read


Digital Security

Adventures in cybersecurity research: Risk, cultural theory, and the white male effect - part 2

Adventures in cybersecurity research: Risk, cultural theory, and the white male effect - part 2

Digital Security

Adventures in cybersecurity research: Risk, cultural theory, and the white male effect - part 2

Armed with the cultural theory described in part one as a possible explanation for why some people do not heed expert advice, we fielded a survey that queried US adults about their attitudes to 15 different technology hazards, including six that were cyber-related.

Stephen Cobb20 Dec 201714 min. read


Digital Security

Adventures in cybersecurity research: Risk, cultural theory, and the white male effect - part 1

Adventures in cybersecurity research: Risk, cultural theory, and the white male effect - part 1

Digital Security

Adventures in cybersecurity research: Risk, cultural theory, and the white male effect - part 1

Again and again we have seen security breaches occur because people did not heed advice that we and other people with expertise in security have been disseminating for years, advice about secure system design, secure system operation, and appropriate security strategy.

Stephen Cobb18 Dec 20179 min. read


Digital Security

Cybersecurity for journalists and the news media

Cybersecurity for journalists and the news media

Digital Security

Cybersecurity for journalists and the news media

In journalism, having good contacts is key and this is true when it comes to defending your digital assets. The following are some sources – of information and, possibly, assistance – that you might want to cultivate.

Stephen Cobb21 Nov 20175 min. read


Digital Security

US Vulnerability Equities Policy: Transparency welcome, but serious questions remain

US Vulnerability Equities Policy: Transparency welcome, but serious questions remain

Digital Security

US Vulnerability Equities Policy: Transparency welcome, but serious questions remain

Commentary on government struggles to protect internet security while stockpiling cyber vulnerabilities in order to launch attacks and gain intelligence.

Stephen Cobb15 Nov 20174 min. read


ESET research

Fighting persistent malware with a UEFI scanner, or 'What's it all about UEFI?"

Fighting persistent malware with a UEFI scanner, or 'What's it all about UEFI?"

ESET research

Fighting persistent malware with a UEFI scanner, or 'What's it all about UEFI?"

The biggest news in malware so far this year has been WannaCryptor a.k.a. WannaCry, and one reason that particular ransomware spread so fast was because it used a “top secret” exploit developed by the NSA, an agency known to have dabbled in UEFI compromise.

Stephen Cobb10 Nov 20174 min. read


Cybercrime

Cybercrime update: Big trouble in dark markets?

Cybercrime update: Big trouble in dark markets?

Cybercrime

Cybercrime update: Big trouble in dark markets?

Many of the components required to commit cybercrime can be bought and sold online if you know the right part of the internet in which to look.

Stephen Cobb18 Aug 20177 min. read