Stephen Cobb

Stephen Cobb

Senior Security Researcher


Education: Master of Science in Security and Risk Management, University of Leicester, UK

Highlights of your career? The Stephen Cobb Guide to PC and LAN Security (1992); The first anti-spam router (2001); Privacy for Business (2002); TEDx talk (2015)

Position and history at ESET? Joined ESET: 2011. Current title: Senior Security Researcher

What malware do you hate the most? State sponsored.

Favorite activities? Reading and writing, and some arithmetic.

What is your golden rule for cyberspace? Don’t put anything on the internet you wouldn’t want your mother to see.

When did you get your first computer and what kind was it? 1982 KayPro II portable computer with dual floppy drives, weighing 26 lbs or 12 Kg.

Favorite computer game/activity? Reading Wikipedia.


224 articles by Stephen Cobb

Information Security Disconnect: RSA, USB, AV, and reality

Information Security Disconnect: RSA, USB, AV, and reality

Information Security Disconnect: RSA, USB, AV, and reality

Stephen Cobb05 Mar 20124 min. read


Security awareness, security breaches, and the abuse of "stupid"

Security awareness, security breaches, and the abuse of "stupid"

Security awareness, security breaches, and the abuse of "stupid"

Stephen Cobb20 Feb 20122 min. read


Cookie-stuffing click-jackers rip off Victoria's Secret Valentine's giftcard seekers

Cookie-stuffing click-jackers rip off Victoria's Secret Valentine's giftcard seekers

Cookie-stuffing click-jackers rip off Victoria's Secret Valentine's giftcard seekers

Stephen Cobb13 Feb 20122 min. read


Endpoint Security Webinar: Protecting your network at the sharp end

Endpoint Security Webinar: Protecting your network at the sharp end

Endpoint Security Webinar: Protecting your network at the sharp end

Stephen Cobb08 Feb 20121 min. read


Valentine's Day Scams: For the love of money

Valentine's Day Scams: For the love of money

Valentine's Day Scams: For the love of money

Stephen Cobb07 Feb 20124 min. read


How to improve Facebook account protection with Login Approvals

How to improve Facebook account protection with Login Approvals

How to improve Facebook account protection with Login Approvals

Stephen Cobb01 Feb 20122 min. read


Tricky Twitter DM hack seeks your credentials, malware infection, and more

Tricky Twitter DM hack seeks your credentials, malware infection, and more

Tricky Twitter DM hack seeks your credentials, malware infection, and more

Stephen Cobb24 Jan 20121 min. read


Facebook's timeline to fraud-a-geddon?

Facebook's timeline to fraud-a-geddon?

Facebook's timeline to fraud-a-geddon?

Stephen Cobb04 Jan 20122 min. read


Latest round of hacktivism highlights questions at the heart of hacking

Latest round of hacktivism highlights questions at the heart of hacking

Latest round of hacktivism highlights questions at the heart of hacking

Stephen Cobb28 Dec 20113 min. read