Lysa Myers

Lysa Myers

Security Researcher


Education? 20 years helping – helping users, analyzing malware, talking with people implementing security technology, and testing security software.

Highlights of your career? Seeing the first few droplets before the Melissa virus storm hit, surviving the Worm Wars of 2004, my first presentation at VB in 2006, and having an article published in USA Today in 2013.

Position and history at ESET? Joined ESET: 2013. Current title: Security Researcher

What malware do you hate the most? The ExploreZip family – it overwrote files, thus destroying the data. Plenty of people lost a lot of work as a result of those outbreaks.

Favorite activities? Adventuring and whimsy-seeking.

What is your golden rule for cyberspace? An ounce of prevention is worth a pound of cure.

When did you get your first computer and what kind was it? 1981 Commodore VIC-20. And then I continued using a variety of early-80s technology until roughly 1993 (oof!).

Favorite computer game/activity? Checking my Twitter feed.


85 articles by Lysa Myers

Less Technical

Myths of the Target Breach

Myths of the Target Breach

Less Technical

Myths of the Target Breach

One of the realities of news that happens at Internet-speed is that it may not be wholly accurate. Much of what has come out about the Target breach contains factual errors that may not seem obvious, especially as they are repeated by many news outlets. So let us take a moment to examine some of the more common myths that have been flying around.

Lysa Myers30 Jan 20145 min. read


Less Technical

Why are so many kids still not receiving computer science education?

Why are so many kids still not receiving computer science education?

Less Technical

Why are so many kids still not receiving computer science education?

The city of Chicago recently announced a change to the curriculum for schools in their district that would introduce children as young as primary school to computer science concepts. It would also allow students to count computer science as a core subject that fulfills graduation requirements. What does this say about the current state of computer-related education?

Lysa Myers21 Jan 20148 min. read


Less Technical

Attention Shoppers! Top tips for defending your accounts against card fraud

Attention Shoppers! Top tips for defending your accounts against card fraud

Less Technical

Attention Shoppers! Top tips for defending your accounts against card fraud

Read how to protect yourself if you've been shopping with credit or debit cards (and who hasn't?). As the scope of the latest cyber crime spree expands beyond Target and Neiman Marcus, malicious software is suspected.

Lysa Myers14 Jan 20144 min. read


Less Technical

Target breach expands: what does this mean?

Target breach expands: what does this mean?

Less Technical

Target breach expands: what does this mean?

Target's 2013 data breach is expanding in scope and scale, requiring additional vigilance on the part of shoppers to protect their accounts and their identity.

Lysa Myers10 Jan 20144 min. read


A look back at 2013 from some folks who live security

A look back at 2013 from some folks who live security

A look back at 2013 from some folks who live security

A look back at security research highlights from 2013. ESET researchers examined everything from Java exploits to rootkits, bootkits, worms, viruses, Trojans, targeted attacks, and security initiatives. Read about malware from Hesperbot to Cryptolocker and headline security breaches like Target, all in one report.

Lysa Myers19 Dec 20132 min. read


How To

Target breached: 5 defensive steps shoppers should take now

Target breached: 5 defensive steps shoppers should take now

How To

Target breached: 5 defensive steps shoppers should take now

Tips for shoppers worried that their credit or debit cards may have been compromised by the massive security breach at Target stores.

Lysa Myers19 Dec 20133 min. read


Ransomware

11 things you can do to protect against ransomware, including Cryptolocker

11 things you can do to protect against ransomware, including Cryptolocker

Ransomware

11 things you can do to protect against ransomware, including Cryptolocker

11 things you can be doing to better protect your computers and data from ransomware such as Cryptolocker that is currently targeting businesses big and small.

Lysa Myers12 Dec 201310 min. read


Kids Online

How do we protect kids from online predators?

How do we protect kids from online predators?

Kids Online

How do we protect kids from online predators?

The Internet is a vast source of information for all of us, and naturally some people use that information for good, and some for ill, like grooming and stalking children. So what things can you as a parent, teacher, or other concerned adult do to protect kids against online predators and solicitation?

Lysa Myers27 Nov 20135 min. read


Active Defense: Good protection doesn’t need to be offensive

Active Defense: Good protection doesn’t need to be offensive

Active Defense: Good protection doesn’t need to be offensive

Just Google for the search term ‘“active defense” startup’ and it is clear that this is a hot growth area in Internet security. But what is it, exactly? The answer to that question is difficult and controversial.

Lysa Myers19 Nov 20137 min. read