Lysa Myers

Lysa Myers

Security Researcher


Education? 20 years helping – helping users, analyzing malware, talking with people implementing security technology, and testing security software.

Highlights of your career? Seeing the first few droplets before the Melissa virus storm hit, surviving the Worm Wars of 2004, my first presentation at VB in 2006, and having an article published in USA Today in 2013.

Position and history at ESET? Joined ESET: 2013. Current title: Security Researcher

What malware do you hate the most? The ExploreZip family – it overwrote files, thus destroying the data. Plenty of people lost a lot of work as a result of those outbreaks.

Favorite activities? Adventuring and whimsy-seeking.

What is your golden rule for cyberspace? An ounce of prevention is worth a pound of cure.

When did you get your first computer and what kind was it? 1981 Commodore VIC-20. And then I continued using a variety of early-80s technology until roughly 1993 (oof!).

Favorite computer game/activity? Checking my Twitter feed.


85 articles by Lysa Myers

Less Technical

Ready, set, shop: 10 top tips for a safe shopping season

Ready, set, shop: 10 top tips for a safe shopping season

Less Technical

Ready, set, shop: 10 top tips for a safe shopping season

Tips for safe holiday shopping: whether you shop online or at the mall, there are some simple strategies that can protect your bank accounts and payment cards against criminal hackers and scammers.

Lysa Myers24 Oct 20146 min. read


Top 5 Scariest Zombie Botnets

Top 5 Scariest Zombie Botnets

Top 5 Scariest Zombie Botnets

An army of the undead, wreaking havoc on the Internet – it's a nightmare scenario that has played out many times as the population of humans online has exploded. Some zombie plagues have been particularly troubling, and we will take a look at the worst of the worst.

Lysa Myers23 Oct 20145 min. read


Cybercrime

Chase breach: Stolen personal info brings headaches too

Chase breach: Stolen personal info brings headaches too

Cybercrime

Chase breach: Stolen personal info brings headaches too

On the one hand, the breach of JP Morgan Chase is not as bad as it could have been. But how do you measure relative “badness” of a breach?

Lysa Myers16 Oct 20143 min. read


How To

How to protect yourself after the Home Depot breach

How to protect yourself after the Home Depot breach

How To

How to protect yourself after the Home Depot breach

Home Depot has issued a statement today that provides more details about their recent breach, as well as indicating that the malware used by the attackers has now been removed from their systems. This breach appears to be even larger than Target’s, as it exposed payment information for 56 million customers in their US and Canada locations.

Lysa Myers19 Sep 20143 min. read


How To

National Health IT Week – tips for starting Risk Assessment

National Health IT Week – tips for starting Risk Assessment

How To

National Health IT Week – tips for starting Risk Assessment

This week is National Health IT Week, and you may be wondering – what is the best way to observe this occasion? While planning for catastrophe may not seem the most celebratory activity, this week is a great occasion to start or review your organization’s risk assessment.

Lysa Myers19 Sep 20145 min. read


How To

How to protect your identity at school

How to protect your identity at school

How To

How to protect your identity at school

Young people are targeted for data theft at 35 times the rate of adults – they are considered an easy target for both digital and physical theft. You can make going back to school an easier transition by ensuring your data and devices are secure both at school and at home.

Lysa Myers22 Aug 20143 min. read


Malware

Homeland Security warns of new Point of Sale attacks

Homeland Security warns of new Point of Sale attacks

Malware

Homeland Security warns of new Point of Sale attacks

New malware targeting point of sale (PoS) systems, detected by ESET as Win32/Spy.Agent.OKG is described in a warning and analysis distributed by US-CERT, a reminder to increase security around PoS access.

Lysa Myers01 Aug 20141 min. read


How To

Is your Point of Sale machine protected against attacks?

Is your Point of Sale machine protected against attacks?

How To

Is your Point of Sale machine protected against attacks?

Criminals are very interested in retailers’ Point of Sale (PoS) machines. Recently, a new type of malware has been found that specifically tries to break into PoS machines, called Win32/BrutPOS.A.

Lysa Myers22 Jul 20143 min. read


Less Technical

Don't let social media undermine the promise of graduation

Don't let social media undermine the promise of graduation

Less Technical

Don't let social media undermine the promise of graduation

Graduation is a great time to review your social media profile. Don't let a wild and crazy social network presence undermine the promise of graduation, your chances for a scholarship, job, internship or other career choices.

Lysa Myers14 Jun 20145 min. read