- ESETSecurity Evangelist, 2011 - present
- NCSA, InfoSec Labs, Rainbow, ePrivacy Group, STSN/iBAHN, Monetate
- University of LeicesterCriminology, 2014 - presentMSc in Security and Risk Management
- King Henry VIII School, CoventryEconomics and English, 1964 - 1970
- University of LeedsEnglish and Religion, 1971 - 1974
Security Bulletin: Steps you should take to fix a Java SE security risk ...
Steps you should take to fix a Java SE security risk on your computer, a message from Oracle, broadcast by ESET, as requested by the FTC.
Healthcare data breaches lead more patients to withhold information from...
New survey suggests medical data breaches increase the number of patients who hold back information from doctors due to concerns about the s
Hemochromatosis (excess iron) raises risk of heart arrhythmia, cirrhosis
Hemochromatosis (excess iron) raises the risk of heart arrhythmia and cirrhosis of the liver.
Cybersecurity and manufacturers: what the costly Chrysler Jeep hack reveals
As the cost of fixing security mistakes in Jeep Chrysler Dodge vehicles mounts, so does the need for manufacturers to weigh cybersecurity ri
HFE testing: an open letter to the American College of Medical Genetics ...
The American College of Medical Genetics and Genomics (ACMG) wants to limit your access to your genes, like whether or not you carry the pot
Whistleblower claims cybersecurity firm hacked clients
A cybersecurity firm is accused of hacking into potential clients in order to extort potential customers, according to Engadget.
Casper Malware: After Babar and Bunny, Another Espionage Cartoon
In this post, we lift the veil on Casper - another piece of software that we believe to have been created by the same organization that is b
Say What? Required contents of notice in data breach notifications
With so many data breaches happening these days, Americans are getting a lot of breach notification letters and emails, but do they deliver
Electronic health records and data abuse: it's about more than medical info
After the Anthem mega-breach, questions abound about possible abuses of medical data. Here is a breakdown that offers some context.
The Sony Pictures Hack: 5 short sharp lessons we all can learn
The recent hacking of Sony Pictures offers valuable lessons in cybersecurity from which every company and consumer can learn.
Cobb’s First Law of Digital Comms | The Stephen Cobb Blog
Cobb’s first law of digital communications states: You should never say anything in a digital communication that you wouldn’t want your moth
Korplug military targeted attacks: Afghanistan & Tajikistan
After taking a look at recent Korplug (PlugX) detections, we identified two larger scale campaigns employing this well-known Remote Access T
CVE-2014-4114: Details on August BlackEnergy PowerPoint Campaigns
In this post we provide additional information on how a specially crafted PowerPoint slideshow file (.PPSX) led to the execution of a BlackE
What to do about Shellshock bash bug on Mac OS X, web servers, routers, ...
The "Bash Bug" or "Shellshock" vulnerability means a wide range of devices, servers and computers, including Mac OS X, will need to be patch