Tomáš Foltýn

Tomáš Foltýn

Editor-in-chief


Education: M.A. in translation and interpreting

Highlights of your career: Wearing two career hats as an in-house editor and as a freelance translator for the better part of the past ten years while retaining a semblance of normality.

Position and history of ESET I joined ESET as a security writer in late 2017 after being bitten by the cybersecurity bug.

What malware do you hate the most Ransomware, for adding insult to injury, literally.

Favorite activities: Reading, cycling, travelling.

Golden rule for cyberspace? 'Distrust and caution are the parents of security.' Benjamin Franklin’s thoughtful advice from 300 years ago nicely applies to cyberspace.

When did you get your first computer and what kind was it? A gifted 386 PC in the mid-1990s. It worked a little erratically, or it may have been a classic example of 'problem exists between keyboard and chair'.

Favorite computer game / activity: I'm a bit of a power user of RSS feeds, which I use to indulge my news consumption habit while keeping empty ‘news calories’ at bay.


374 articles by Tomáš Foltýn

Digital Security

Concerns about data breaches hitting all-time high

Concerns about data breaches hitting all-time high

Digital Security

Concerns about data breaches hitting all-time high

A record-high proportion of organizations worldwide (67%) said that they had been breached at some point, up from 56% in the report’s previous edition.

Tomáš Foltýn15 Feb 20182 min. read


Internet of Things

How safe are you around your smart TV?

How safe are you around your smart TV?

Internet of Things

How safe are you around your smart TV?

Smart TVs afford us the opportunity to use them for purposes that are more commonly associated with computers. In fact, that’s what these TVs have become – internet-connected ‘computers’, much like mobile phones. It would no doubt help if we thought of them as such and treated them accordingly.

Tomáš Foltýn14 Feb 20184 min. read


US and UK government websites hijacked to mine cryptocurrency on visitors’ machines

US and UK government websites hijacked to mine cryptocurrency on visitors’ machines

US and UK government websites hijacked to mine cryptocurrency on visitors’ machines

If undetected by a user’s security solution or content- or ad-blocker, the script ran in the background unbeknown to the user until the webpage was closed. A number of the affected websites, including that of the ICO, were also offline for hours in the aftermath of the attack.

Tomáš Foltýn12 Feb 20183 min. read


Cybercrime

Global cybercrime behemoth busted, 36 people indicted

Global cybercrime behemoth busted, 36 people indicted

Cybercrime

Global cybercrime behemoth busted, 36 people indicted

According to US authorities, the enterprise aimed at becoming the premier destination for the buying and selling of stolen payment card data and forged identification documents. It is believed that the losses that the Infraud Organization had intended to cause were north of $2.2 billion.

Tomáš Foltýn08 Feb 20183 min. read


Digital Security

UK-led police operation quashes Luminosity Link RAT

UK-led police operation quashes Luminosity Link RAT

Digital Security

UK-led police operation quashes Luminosity Link RAT

The investigation showed that the tool, which required little technical knowledge to deploy, had over 8,600 users in 78 countries. Victims are believed to be in the thousands.

Tomáš Foltýn07 Feb 20182 min. read


Scams

FBI warns of email scams claiming to be from Bureau

FBI warns of email scams claiming to be from Bureau

Scams

FBI warns of email scams claiming to be from Bureau

Another template attempts to scare, rather than thrill, the recipients. Upon learning that “your IP address and other identifying information were used to commit multiple online crimes”, the mark is urged to contact the sender by phone immediately.

Tomáš Foltýn06 Feb 20182 min. read


Digital Security

Babies’ personal data hawked on dark web

Babies’ personal data hawked on dark web

Digital Security

Babies’ personal data hawked on dark web

The price puts the data records at a significant premium when compared to other stolen datasets. While, in general, many adverts in the dark recesses of the internet are fake, children’s personally identifiable information (PII) has for long been viewed as a particularly valuable commodity.

Tomáš Foltýn26 Jan 20182 min. read


Secure Coding

How well can bug hunting pay?

How well can bug hunting pay?

Secure Coding

How well can bug hunting pay?

In some countries, the financial allure of looking for security vulnerabilities is (even) more striking, according to the findings of a survey released recently by bug bounty platform provider HackerOne.

Tomáš Foltýn25 Jan 20182 min. read


South Korea moves to ban anonymous cryptocurrency trading

South Korea moves to ban anonymous cryptocurrency trading

South Korea moves to ban anonymous cryptocurrency trading

As part of the policy, underage individuals and foreigners without local bank accounts will be barred from trading in virtual currencies. Banks will be required to share information about cryptocurrency exchanges with each other.

Tomáš Foltýn23 Jan 20183 min. read