Lysa Myers

Lysa Myers

Security Researcher


Education? 20 years helping – helping users, analyzing malware, talking with people implementing security technology, and testing security software.

Highlights of your career? Seeing the first few droplets before the Melissa virus storm hit, surviving the Worm Wars of 2004, my first presentation at VB in 2006, and having an article published in USA Today in 2013.

Position and history at ESET? Joined ESET: 2013. Current title: Security Researcher

What malware do you hate the most? The ExploreZip family – it overwrote files, thus destroying the data. Plenty of people lost a lot of work as a result of those outbreaks.

Favorite activities? Adventuring and whimsy-seeking.

What is your golden rule for cyberspace? An ounce of prevention is worth a pound of cure.

When did you get your first computer and what kind was it? 1981 Commodore VIC-20. And then I continued using a variety of early-80s technology until roughly 1993 (oof!).

Favorite computer game/activity? Checking my Twitter feed.


85 articles by Lysa Myers

Privacy

How can domestic violence survivors protect their privacy?

How can domestic violence survivors protect their privacy?

Privacy

How can domestic violence survivors protect their privacy?

Domestic violence is not something that gets discussed much in information security circles, but there are few people that need advice on assuring their online safety more urgently than victims of stalking and domestic abuse. What can people do to protect themselves when there is a known and persistent threat?

Lysa Myers07 Nov 201312 min. read


Mavericks gooses OS X 10.9 adoption rate

Mavericks gooses OS X 10.9 adoption rate

Mavericks gooses OS X 10.9 adoption rate

Will Apple’s recent move to offer OS X 10.9 Mavericks as a free update boost adoption and security? We could be seeing a new model of operating system upgrades emerging across numerous platforms.

Lysa Myers04 Nov 20134 min. read


Malware

Scary Code: Top 5 malware that kept researchers up at night

Scary Code: Top 5 malware that kept researchers up at night

Malware

Scary Code: Top 5 malware that kept researchers up at night

If sinister pieces of malicious code could rise from the dead on Halloween, which would be the most scary for antivirus researchers? Here are 5 contenders, with a variety of very nasty traits.

Lysa Myers31 Oct 20135 min. read


ESET research

Is this how Indonesia topped the malicious traffic charts?

Is this how Indonesia topped the malicious traffic charts?

ESET research

Is this how Indonesia topped the malicious traffic charts?

Indonesia as a major source of malicious traffic? That's what a recent infographic from content delivery network provider Akamai seemed to say. In her first article for We Live Security, ESET security researcher Lysa Myers investigates.

Lysa Myers23 Oct 20137 min. read