Stephen Cobb

Stephen Cobb

Senior Security Researcher


Education: Master of Science in Security and Risk Management, University of Leicester, UK

Highlights of your career? The Stephen Cobb Guide to PC and LAN Security (1992); The first anti-spam router (2001); Privacy for Business (2002); TEDx talk (2015)

Position and history at ESET? Joined ESET: 2011. Current title: Senior Security Researcher

What malware do you hate the most? State sponsored.

Favorite activities? Reading and writing, and some arithmetic.

What is your golden rule for cyberspace? Don’t put anything on the internet you wouldn’t want your mother to see.

When did you get your first computer and what kind was it? 1982 KayPro II portable computer with dual floppy drives, weighing 26 lbs or 12 Kg.

Favorite computer game/activity? Reading Wikipedia.


224 articles by Stephen Cobb

Less Technical

Linux Apache malware: Why it matters to you and your business

Linux Apache malware: Why it matters to you and your business

Less Technical

Linux Apache malware: Why it matters to you and your business

This comprehensive look at the problems of malware on Linux Apache web servers explains the threats to business and helps you figure out if your organization is likely to be affected.

Stephen Cobb06 May 201310 min. read


ESET research

The stealthiness of Linux/Cdorked: a clarification

The stealthiness of Linux/Cdorked: a clarification

ESET research

The stealthiness of Linux/Cdorked: a clarification

We clarify that the Linux/Cdorked backdoor malware leaves no traces on the hard drive "other than its modified httpd binary" which can be scanned for detection in several ways.

Stephen Cobb02 May 20133 min. read


Scams

Beware scammers preying on Boston Marathon tragedy

Beware scammers preying on Boston Marathon tragedy

Scams

Beware scammers preying on Boston Marathon tragedy

In the wake of the cowardly and despicable bombings in Boston today, people who want to help need to be wary of appeals for money for victims or schemes like retweeting and "Likes" on Facebook.

Stephen Cobb16 Apr 20132 min. read


Less Technical

Schneier, Winkler and the Great Security Awareness Training Debate

Schneier, Winkler and the Great Security Awareness Training Debate

Less Technical

Schneier, Winkler and the Great Security Awareness Training Debate

The value of educating people about cyber security is hotly debated these days, with opposing views on security awareness training coming from Bruce Schneier and Ira Winkler. Stephen Cobb weighs in.

Stephen Cobb27 Mar 20135 min. read


Digital Security

Apple ID password and verification two-step plays on

Apple ID password and verification two-step plays on

Digital Security

Apple ID password and verification two-step plays on

Stepping up protection of the Apple ID falters as password reset bug emerges before two-step verification is fully implemented.

Stephen Cobb24 Mar 20133 min. read


Less Technical

From flicks to clicks: Mac OS X Trojan Adware.Yontoo infects via fake codec

From flicks to clicks: Mac OS X Trojan Adware.Yontoo infects via fake codec

Less Technical

From flicks to clicks: Mac OS X Trojan Adware.Yontoo infects via fake codec

Protection and remediation tips for Mac OS X users targeted by a Trojan adware plugin called Yontoo hidden behind movie trailer and other media playing links, generating money for criminals exploiting online ad schemes.

Stephen Cobb22 Mar 20133 min. read


Less Technical

Social media makes scams and hoaxes harder to spot

Social media makes scams and hoaxes harder to spot

Less Technical

Social media makes scams and hoaxes harder to spot

If your friend said it on Social media it must be true? Not if your friend's acount has been hacked. We review tips for staying safe on social media.

Stephen Cobb18 Mar 20135 min. read


Less Technical

Tax-related scams plague IRS and taxpayers

Tax-related scams plague IRS and taxpayers

Less Technical

Tax-related scams plague IRS and taxpayers

Answers to common questions about tax season scams in America and advice about fending off the malicious activity that seeks to exploit tax matters.

Stephen Cobb18 Mar 20137 min. read


Mobile Security

Android security issues: does a Microsoft Windows analogy make sense?

Android security issues: does a Microsoft Windows analogy make sense?

Mobile Security

Android security issues: does a Microsoft Windows analogy make sense?

Malware targeting Android devices shows no signs of relenting, despite the enthusiasm of Android fans. We look at key data points and weigh risks to users.

Stephen Cobb11 Mar 20137 min. read