Lysa Myers

Lysa Myers

Security Researcher


Education? 20 years helping – helping users, analyzing malware, talking with people implementing security technology, and testing security software.

Highlights of your career? Seeing the first few droplets before the Melissa virus storm hit, surviving the Worm Wars of 2004, my first presentation at VB in 2006, and having an article published in USA Today in 2013.

Position and history at ESET? Joined ESET: 2013. Current title: Security Researcher

What malware do you hate the most? The ExploreZip family – it overwrote files, thus destroying the data. Plenty of people lost a lot of work as a result of those outbreaks.

Favorite activities? Adventuring and whimsy-seeking.

What is your golden rule for cyberspace? An ounce of prevention is worth a pound of cure.

When did you get your first computer and what kind was it? 1981 Commodore VIC-20. And then I continued using a variety of early-80s technology until roughly 1993 (oof!).

Favorite computer game/activity? Checking my Twitter feed.


85 articles by Lysa Myers

Less Technical

eBay breach news: Posted data dump not valid, password reset issues

eBay breach news: Posted data dump not valid, password reset issues

Less Technical

eBay breach news: Posted data dump not valid, password reset issues

As the 145 million people affected by the security breach at online giant eBay get used to the idea that their personal information may be "out there" and their passwords need to be changed, we wanted to update yesterday's coverage of the story.

Lysa Myers22 May 20142 min. read


Less Technical

eBay customers urged to change their passwords after breach

eBay customers urged to change their passwords after breach

Less Technical

eBay customers urged to change their passwords after breach

eBay customers should change passwords following this latest high profile breach. The Internet giant says the hack exposed names, addresses, phone numbers, and encrypted passwords of customers.

Lysa Myers21 May 20143 min. read


Less Technical

Ransomware on Android: Keep calm but get protected

Ransomware on Android: Keep calm but get protected

Less Technical

Ransomware on Android: Keep calm but get protected

There has been a lot of talk in the news lately of a new ransomware for Android. While this does sound dire, and the possibility exists for more problematic threats on Androids in the future, it is not yet time to panic.

Lysa Myers12 May 20142 min. read


Cybercrime

Tax identity fraudsters target third-party payroll sites: are you protected?

Tax identity fraudsters target third-party payroll sites: are you protected?

Cybercrime

Tax identity fraudsters target third-party payroll sites: are you protected?

Tax identity fraud is on the rise this year, possibly due to criminals getting craftier in their choice of breach targets. According to a series of reports from Brian Krebs, fraudsters are now targeting third-party payroll services.

Lysa Myers06 May 20144 min. read


Kids Online

How do you know if your child's ID has been stolen?

How do you know if your child's ID has been stolen?

Kids Online

How do you know if your child's ID has been stolen?

When it comes to identity theft, the most successful attack is on the person least likely to be aware of activity being carried out in his or her name. That being the case, it is hard to imagine anyone who better fits the bill than a child.

Lysa Myers22 Apr 20143 min. read


Cybercrime

What is EMV, and why is it such a hot topic?

What is EMV, and why is it such a hot topic?

Cybercrime

What is EMV, and why is it such a hot topic?

You may know it by one of many names: EMV, Integrated Chip Cards, or more simply Chip & Pin or Smart Cards… but whatever you call it: it is a hot topic for debate on the subject of credit card fraud. In this post we will explain the difference between these and traditional credit cards, and why it is being discussed so heatedly in the wake of the Target breach.

Lysa Myers03 Apr 20145 min. read


Less Technical

Tips for protecting against sextortion

Tips for protecting against sextortion

Less Technical

Tips for protecting against sextortion

It seems like every few days there is a new story involving teenaged girls being tricked or blackmailed into sending compromising pictures of themselves to their tormenters. For the last few years, the FBI has been warning that this crime – “Sextortion” – is on the rise.

Lysa Myers17 Mar 20144 min. read


How To

How can we as patients secure our medical data?

How can we as patients secure our medical data?

How To

How can we as patients secure our medical data?

When someone says “data privacy” most people think about the information that is available on sites like Google and Facebook, or stored away in some marketing database. But when it comes to very private information, there are few things most of us would be more horrified to find floating around on the Internet than our medical data.

Lysa Myers04 Mar 20143 min. read


How To

How can doctors practice better health information security?

How can doctors practice better health information security?

How To

How can doctors practice better health information security?

Did you know that medical data on 20,000 people may be exposed to abuse today? As a healthcare practitioner, you may not be aware of the value of the data in your care, but criminals certainly are.

Lysa Myers19 Feb 20145 min. read