This whole Tiversa-LabMD-FTC thing is a right cybersecurity mess, but now there is a witness with criminal immunity from the DoJ. And the story he tells is not pretty.
- ESETSecurity Evangelist, 2011 - present
- NCSA, InfoSec Labs, Rainbow, ePrivacy Group, STSN/iBAHN, Monetate
- University of LeicesterCriminology, 2014 - presentMSc in Security and Risk Management
- King Henry VIII School, CoventryEconomics and English, 1964 - 1970
- University of LeedsEnglish and Religion, 1971 - 1974
Cybersecurity and manufacturers: what the costly Chrysler Jeep hack reveals
As the cost of fixing security mistakes in Jeep Chrysler Dodge vehicles mounts, so does the need for manufacturers to weigh cybersecurity ri
HFE testing: an open letter to the American College of Medical Genetics ...
The American College of Medical Genetics and Genomics (ACMG) wants to limit your access to your genes, like whether or not you carry the pot
Whistleblower claims cybersecurity firm hacked clients
A cybersecurity firm is accused of hacking into potential clients in order to extort potential customers, according to Engadget.
Casper Malware: After Babar and Bunny, Another Espionage Cartoon
In this post, we lift the veil on Casper - another piece of software that we believe to have been created by the same organization that is b
Say What? Required contents of notice in data breach notifications
With so many data breaches happening these days, Americans are getting a lot of breach notification letters and emails, but do they deliver
Electronic health records and data abuse: it's about more than medical info
After the Anthem mega-breach, questions abound about possible abuses of medical data. Here is a breakdown that offers some context.
The Sony Pictures Hack: 5 short sharp lessons we all can learn
The recent hacking of Sony Pictures offers valuable lessons in cybersecurity from which every company and consumer can learn.
Cobb’s First Law of Digital Comms | The Stephen Cobb Blog
Cobb’s first law of digital communications states: You should never say anything in a digital communication that you wouldn’t want your moth
Korplug military targeted attacks: Afghanistan & Tajikistan
After taking a look at recent Korplug (PlugX) detections, we identified two larger scale campaigns employing this well-known Remote Access T
CVE-2014-4114: Details on August BlackEnergy PowerPoint Campaigns
In this post we provide additional information on how a specially crafted PowerPoint slideshow file (.PPSX) led to the execution of a BlackE
What to do about Shellshock bash bug on Mac OS X, web servers, routers, ...
The "Bash Bug" or "Shellshock" vulnerability means a wide range of devices, servers and computers, including Mac OS X, will need to be patch
What's behind the rise in cybercrime? Find out from this recorded presen...
Home Depot says it was hacked to the tune of 56 million payment cards. What is behind the current wave of cybercrime? This recorded presenta
Nude Celebs, Target, Home Depot: Who is to blame? Criminals!
The blame game rages on in the wake of Celebgate and massive payment card hacks like Home Depot and Target, as though criminals were not the
The state of healthcare IT security: are Americans concerned enough?
The privacy and security of medical records is a matter of concern to many Americans now that most are now stored electronically, but is the