Tomáš Foltýn

Tomáš Foltýn

Editor-in-chief


Education: M.A. in translation and interpreting

Highlights of your career: Wearing two career hats as an in-house editor and as a freelance translator for the better part of the past ten years while retaining a semblance of normality.

Position and history of ESET I joined ESET as a security writer in late 2017 after being bitten by the cybersecurity bug.

What malware do you hate the most Ransomware, for adding insult to injury, literally.

Favorite activities: Reading, cycling, travelling.

Golden rule for cyberspace? 'Distrust and caution are the parents of security.' Benjamin Franklin’s thoughtful advice from 300 years ago nicely applies to cyberspace.

When did you get your first computer and what kind was it? A gifted 386 PC in the mid-1990s. It worked a little erratically, or it may have been a classic example of 'problem exists between keyboard and chair'.

Favorite computer game / activity: I'm a bit of a power user of RSS feeds, which I use to indulge my news consumption habit while keeping empty ‘news calories’ at bay.


374 articles by Tomáš Foltýn

Digital Security

The rise of AI needs to be controlled, report warns

The rise of AI needs to be controlled, report warns

Digital Security

The rise of AI needs to be controlled, report warns

The experts urge policy-makers to work closely with technical researchers, computer scientists and the cybersecurity community to investigate, understand and prepare for possible malicious uses of AI.

Tomáš Foltýn02 Mar 20183 min. read


Privacy

Researchers unveil Veil to make ‘private browsing more private’

Researchers unveil Veil to make ‘private browsing more private’

Privacy

Researchers unveil Veil to make ‘private browsing more private’

The blinding server randomly adds some nonsense code to every webpage. This ‘code obfuscation’, according to the academics, has no effect on what the actual page looks like, but it drastically changes the appearance of the underlying source file.

Tomáš Foltýn28 Feb 20183 min. read


Digital Security

One-third of organizations sacrifice mobile security for business performance

One-third of organizations sacrifice mobile security for business performance

Digital Security

One-third of organizations sacrifice mobile security for business performance

Only one in seven organizations have put in place all four basic cybersecurity practices specified by Verizon – changing all default passwords, encrypting data transmitted over public networks, granting employee access on a need-to-know basis, and testing security systems regularly.

Tomáš Foltýn27 Feb 20182 min. read


Cybercrime

Over 40% of online login attempts are attackers trying to invade accounts

Over 40% of online login attempts are attackers trying to invade accounts

Cybercrime

Over 40% of online login attempts are attackers trying to invade accounts

Bots that traverse the internet on behalf of their human operators can fulfill both legitimate and malicious automated tasks. Statistics indicate that bot-driven internet traffic, by helper and harmful bots combined, surpasses human traffic.

Tomáš Foltýn26 Feb 20183 min. read


Survey shows sloppy password habits among young Brits

Survey shows sloppy password habits among young Brits

Survey shows sloppy password habits among young Brits

Young people were singled out as increasingly likely victims of internet-borne fraud, including because of their penchant for liberal sharing of personal information.

Tomáš Foltýn22 Feb 20182 min. read


Apple defuses ‘text bomb’ bug

Apple defuses ‘text bomb’ bug

Apple defuses ‘text bomb’ bug

A number of text-based apps crashed, became unresponsive or entered an endless bootloop when attempting to show the otherwise little-used character from a language that is spoken by some 75 million people.

Tomáš Foltýn21 Feb 20182 min. read


Cybercrime

Cybercrime weighs most heavily on financial service firms

Cybercrime weighs most heavily on financial service firms

Cybercrime

Cybercrime weighs most heavily on financial service firms

A further breakdown of the overall figures shows that, in all, the actual cost hinges on a number of variables. The factors that enter heavily into the equation include attack types and their frequency, along with the organization’s size and even the country in which an organization is based.

Tomáš Foltýn20 Feb 20182 min. read


Cybercrime

Millions bagged in two bank cyber-heists

Millions bagged in two bank cyber-heists

Cybercrime

Millions bagged in two bank cyber-heists

This hack is said to be reminiscent of a particularly brazen bank cyber-heist from February 2016, in which hackers successfully pilfered $81 million from the account of the central bank of Bangladesh at the Federal Reserve Bank of New York.

Tomáš Foltýn19 Feb 20182 min. read


Critical Infrastructure

US forms dedicated office to help avert cyberattacks on infrastructure

US forms dedicated office to help avert cyberattacks on infrastructure

Critical Infrastructure

US forms dedicated office to help avert cyberattacks on infrastructure

The vulnerability of critical infrastructure, including energy grids, to cyberattacks has been a growing concern worldwide. Many nations have been scrambling to improve their defenses vis-à-vis threats faced by services that are critical to the continuity of our daily lives.

Tomáš Foltýn16 Feb 20183 min. read