Tomáš Foltýn

Tomáš Foltýn

Editor-in-chief


Education: M.A. in translation and interpreting

Highlights of your career: Wearing two career hats for the better part of the past ten years while retaining a semblance of normality.

Position and history of ESET I joined ESET as a security writer in late 2017 after being bitten by the cybersecurity bug.

What malware do you hate the most Ransomware (for adding insult to injury, literally).

Favorite activities: Reading, cycling, travelling.

Golden rule for cyberspace? 'Distrust and caution are the parents of security.' Benjamin Franklin’s thoughtful advice from 300 years ago nicely applies to cyberspace.

When did you get your first computer and what kind was it? A gifted 386 PC in the mid-1990s. It worked a little erratically, though (or maybe it was a classic example of 'problem exists between keyboard and chair'?)

Favorite computer game / activity: I'm a bit of a power user of RSS feeds, which I use to indulge my news consumption habit while keeping empty ‘news calories’ at bay.


409 articles by Tomáš Foltýn

What’s the deal with session-replay scripts?

What’s the deal with session-replay scripts?

What’s the deal with session-replay scripts?

Some aspects of online tracking go beyond just website analytics

Tomáš Foltýn20 Apr 20183 min. read


Rough patch, or how to shut the window of (unpatched) opportunity

Rough patch, or how to shut the window of (unpatched) opportunity

Rough patch, or how to shut the window of (unpatched) opportunity

Simply throwing more staff at the patching problem won’t cut it, a study suggests.

Tomáš Foltýn19 Apr 20183 min. read


Quarterly cybercrime digest: Extraditions and more

Quarterly cybercrime digest: Extraditions and more

Quarterly cybercrime digest: Extraditions and more

As Internet crime knows no borders, mutual legal assistance involving various nations and, by extension, requests for extraditing suspected cyber-offenders are sometimes part and parcel of prosecution efforts.

Tomáš Foltýn17 Apr 20184 min. read


Quarterly cybercrime digest: Sentencing

Quarterly cybercrime digest: Sentencing

Quarterly cybercrime digest: Sentencing

The long arm of the law caught up with a number of cybercriminals in the first three months of this year.

Tomáš Foltýn16 Apr 20184 min. read


This ransomware wants you to play, not pay

This ransomware wants you to play, not pay

This ransomware wants you to play, not pay

An unusual ransomware request has been uncovered by researchers.

Tomáš Foltýn13 Apr 20182 min. read


Quarterly cybercrime digest: Arresting and charging

Quarterly cybercrime digest: Arresting and charging

Quarterly cybercrime digest: Arresting and charging

In Part 1, our roundup of some of the most notable law enforcement actions against computer crime in the first quarter of 2018 will focus on arrests and charges involving suspected cyber-crooks.

Tomáš Foltýn13 Apr 20184 min. read


Fraudsters intercept corporate debit cards and swap out chips in new scam

Fraudsters intercept corporate debit cards and swap out chips in new scam

Fraudsters intercept corporate debit cards and swap out chips in new scam

Criminals have devised a new scheme that aims to drain the bank accounts of large corporations.

Tomáš Foltýn10 Apr 20181 min. read


Hacker who broke into NFL’s Twitter account to spread death hoax learns his punishment

Hacker who broke into NFL’s Twitter account to spread death hoax learns his punishment

Hacker who broke into NFL’s Twitter account to spread death hoax learns his punishment

The 2016 compromise of the league’s Twitter account is one of a number of high-profile social media hijackings.

Tomáš Foltýn09 Apr 20182 min. read


Study: White House email domains at risk of being misused for phishing scams

Study: White House email domains at risk of being misused for phishing scams

Study: White House email domains at risk of being misused for phishing scams

Most of the White House's email domains have yet to deploy an email authentication protocol known as DMARC that is designed to reduce the risk of attackers impersonating legitimate email addresses for distributing spam or phishing messages.

Tomáš Foltýn06 Apr 20182 min. read