- ESETSecurity Evangelist, 2011 - present
- NCSA, InfoSec Labs, Rainbow, ePrivacy Group, STSN/iBAHN, Monetate
- University of LeicesterCriminology, 2014 - presentMSc in Security and Risk Management
- King Henry VIII School, CoventryEconomics and English, 1964 - 1970
- University of LeedsEnglish and Religion, 1971 - 1974
Casper Malware: After Babar and Bunny, Another Espionage Cartoon
In this post, we lift the veil on Casper - another piece of software that we believe to have been created by the same organization that is b
Say What? Required contents of notice in data breach notifications
With so many data breaches happening these days, Americans are getting a lot of breach notification letters and emails, but do they deliver
Electronic health records and data abuse: it's about more than medical info
After the Anthem mega-breach, questions abound about possible abuses of medical data. Here is a breakdown that offers some context.
The Sony Pictures Hack: 5 short sharp lessons we all can learn
The recent hacking of Sony Pictures offers valuable lessons in cybersecurity from which every company and consumer can learn.
Cobb’s First Law of Digital Comms | The Stephen Cobb Blog
Cobb’s first law of digital communications states: You should never say anything in a digital communication that you wouldn’t want your moth
Korplug military targeted attacks: Afghanistan & Tajikistan
After taking a look at recent Korplug (PlugX) detections, we identified two larger scale campaigns employing this well-known Remote Access T
CVE-2014-4114: Details on August BlackEnergy PowerPoint Campaigns
In this post we provide additional information on how a specially crafted PowerPoint slideshow file (.PPSX) led to the execution of a BlackE
What to do about Shellshock bash bug on Mac OS X, web servers, routers, ...
The "Bash Bug" or "Shellshock" vulnerability means a wide range of devices, servers and computers, including Mac OS X, will need to be patch
What's behind the rise in cybercrime? Find out from this recorded presen...
Home Depot says it was hacked to the tune of 56 million payment cards. What is behind the current wave of cybercrime? This recorded presenta
Nude Celebs, Target, Home Depot: Who is to blame? Criminals!
The blame game rages on in the wake of Celebgate and massive payment card hacks like Home Depot and Target, as though criminals were not the
The state of healthcare IT security: are Americans concerned enough?
The privacy and security of medical records is a matter of concern to many Americans now that most are now stored electronically, but is the
Homeland Security warns of new Point of Sale attacks
New malware targeting point of sale (PoS) systems, detected by ESET as Win32/Spy.Agent.OKG is described in a warning and analysis distribute
Comic-Con 2014: Eight super-powered digital safety tips
Comic Con 2014 will see more than 130,000 attendees descend on San Diego - our Comic-Con 2014 tips should help keep laptops, smartphones and