Stephen Cobb

Stephen Cobb

Senior Security Researcher


Education: Master of Science in Security and Risk Management, University of Leicester, UK

Highlights of your career? The Stephen Cobb Guide to PC and LAN Security (1992); The first anti-spam router (2001); Privacy for Business (2002); TEDx talk (2015)

Position and history at ESET? Joined ESET: 2011. Current title: Senior Security Researcher

What malware do you hate the most? State sponsored.

Favorite activities? Reading and writing, and some arithmetic.

What is your golden rule for cyberspace? Don’t put anything on the internet you wouldn’t want your mother to see.

When did you get your first computer and what kind was it? 1982 KayPro II portable computer with dual floppy drives, weighing 26 lbs or 12 Kg.

Favorite computer game/activity? Reading Wikipedia.


224 articles by Stephen Cobb

Snowden: 4 big security and privacy assumptions he undermined

Snowden: 4 big security and privacy assumptions he undermined

Snowden: 4 big security and privacy assumptions he undermined

ESET's Stephen Cobb explains the four significant security and privacy assumptions that Snowden’s actions, and the resulting revelations, have undermined.

Stephen Cobb15 Sep 20169 min. read


Ransomware

Jackware: When connected cars meet ransomware

Jackware: When connected cars meet ransomware

Ransomware

Jackware: When connected cars meet ransomware

Beware jackware, malicious software that seeks to take control of a device, the primary purpose of which is not data processing or digital communications.

Stephen Cobb20 Jul 20167 min. read


Cybercrime

Is the federal government doing enough to catch and prosecute computer criminals?

Is the federal government doing enough to catch and prosecute computer criminals?

Cybercrime

Is the federal government doing enough to catch and prosecute computer criminals?

With ransomware running rampant we asked Americans if they thought the US federal government was doing enough to catch and prosecute computer criminals.

Stephen Cobb07 Jun 20166 min. read


Cybercrime

Network ELOFANTS and other insider threat insights from the DBIR and beyond

Network ELOFANTS and other insider threat insights from the DBIR and beyond

Cybercrime

Network ELOFANTS and other insider threat insights from the DBIR and beyond

An ELOFANT is an "Employee Left Or Fired, Access Not Terminated" and these ghost account insiders can undermine your organization's information security, as recent DBIR stats suggest.

Stephen Cobb02 Jun 20165 min. read


Digital Security

What the CISSP? 20 years as a Certified Information Systems Security Professional

What the CISSP? 20 years as a Certified Information Systems Security Professional

Digital Security

What the CISSP? 20 years as a Certified Information Systems Security Professional

Reflecting on 20 years of CISSP, the Certified Information Systems Security Professional qualification from (ISC)2, the International Information System Security Certification Consortium.

Stephen Cobb28 May 20165 min. read


Privacy

GDPR Day: countdown to a global privacy and security regimen?

GDPR Day: countdown to a global privacy and security regimen?

Privacy

GDPR Day: countdown to a global privacy and security regimen?

This thing called GDPR will impact data security and privacy policy at many US firms when it takes effect two years from today. Start learning what the EU General Data Protection Regulation means to your business.

Stephen Cobb25 May 20166 min. read


Cybercrime

Privacy and security fears - predictably - impact US online commerce

Privacy and security fears - predictably - impact US online commerce

Cybercrime

Privacy and security fears - predictably - impact US online commerce

US government data say 45% curtail online activity due to privacy and security fears, which is sad but not surprising because we could see this coming.

Stephen Cobb16 May 20166 min. read


How To

Security Bulletin: Steps you should take to fix a Java SE security risk on your computer

Security Bulletin: Steps you should take to fix a Java SE security risk on your computer

How To

Security Bulletin: Steps you should take to fix a Java SE security risk on your computer

Steps you should take to fix a Java SE security risk on your computer, a message from Oracle, broadcast by ESET, as requested by the FTC.

Stephen Cobb29 Apr 20164 min. read


Privacy

Data privacy and data protection: US law and legislation white paper

Data privacy and data protection: US law and legislation white paper

Privacy

Data privacy and data protection: US law and legislation white paper

This white paper on data privacy and data protection law and legislation in the US should prove to be a handy reference during ongoing privacy debates.

Stephen Cobb26 Apr 20163 min. read