Author
Tomáš Foltýn
Tomáš Foltýn
Security Writer
Go to latest posts

Education: M.A. in translation and interpreting

Highlights of your career: Wearing two career hats as an in-house editor and as a freelance translator for the better part of the past ten years while retaining a semblance of normality.

Position and history of ESET I joined ESET as a security writer in late 2017 after being bitten by the cybersecurity bug.

What malware do you hate the most Ransomware, for adding insult to injury, literally.

Favorite activities: Reading, cycling, travelling.

Golden rule for cyberspace? 'Distrust and caution are the parents of security.' Benjamin Franklin’s thoughtful advice from 300 years ago nicely applies to cyberspace.

When did you get your first computer and what kind was it? A gifted 386 PC in the mid-1990s. It worked a little erratically, or it may have been a classic example of 'problem exists between keyboard and chair'.

Favorite computer game / activity: I'm a bit of a power user of RSS feeds, which I use to indulge my news consumption habit while keeping empty ‘news calories’ at bay.

Apple defuses ‘text bomb’ bug

A number of text-based apps crashed, became unresponsive or entered an endless bootloop when attempting to show the otherwise little-used character from a language that is spoken by some 75 million people.

Cybercrime weighs most heavily on financial service firms

A further breakdown of the overall figures shows that, in all, the actual cost hinges on a number of variables. The factors that enter heavily into the equation include attack types and their frequency, along with the organization’s size and even the country in which an organization is based.

Millions bagged in two bank cyber-heists

This hack is said to be reminiscent of a particularly brazen bank cyber-heist from February 2016, in which hackers successfully pilfered $81 million from the account of the central bank of Bangladesh at the Federal Reserve Bank of New York.

US forms dedicated office to help avert cyberattacks on infrastructure

The vulnerability of critical infrastructure, including energy grids, to cyberattacks has been a growing concern worldwide. Many nations have been scrambling to improve their defenses vis-à-vis threats faced by services that are critical to the continuity of our daily lives.

Concerns about data breaches hitting all-time high

A record-high proportion of organizations worldwide (67%) said that they had been breached at some point, up from 56% in the report’s previous edition.

How safe are you around your smart TV?

Smart TVs afford us the opportunity to use them for purposes that are more commonly associated with computers. In fact, that’s what these TVs have become – internet-connected ‘computers’, much like mobile phones. It would no doubt help if we thought of them as such and treated them accordingly.

US and UK government websites hijacked to mine cryptocurrency on visitors’ machines

If undetected by a user’s security solution or content- or ad-blocker, the script ran in the background unbeknown to the user until the webpage was closed. A number of the affected websites, including that of the ICO, were also offline for hours in the aftermath of the attack.

Global cybercrime behemoth busted, 36 people indicted

According to US authorities, the enterprise aimed at becoming the premier destination for the buying and selling of stolen payment card data and forged identification documents. It is believed that the losses that the Infraud Organization had intended to cause were north of $2.2 billion.

UK-led police operation quashes Luminosity Link RAT

The investigation showed that the tool, which required little technical knowledge to deploy, had over 8,600 users in 78 countries. Victims are believed to be in the thousands.

FBI warns of email scams claiming to be from Bureau

Another template attempts to scare, rather than thrill, the recipients. Upon learning that “your IP address and other identifying information were used to commit multiple online crimes”, the mark is urged to contact the sender by phone immediately.

Babies’ personal data hawked on dark web

The price puts the data records at a significant premium when compared to other stolen datasets. While, in general, many adverts in the dark recesses of the internet are fake, children’s personally identifiable information (PII) has for long been viewed as a particularly valuable commodity.

How well can bug hunting pay?

In some countries, the financial allure of looking for security vulnerabilities is (even) more striking, according to the findings of a survey released recently by bug bounty platform provider HackerOne.

South Korea moves to ban anonymous cryptocurrency trading

As part of the policy, underage individuals and foreigners without local bank accounts will be barred from trading in virtual currencies. Banks will be required to share information about cryptocurrency exchanges with each other.

Up to 40,000 OnePlus customers potentially hit by credit card hack

The breach put at risk ‘only’ the customers who entered their payment data on oneplus.net between the middle of November 2017 and January 11, 2018. Those who paid with previously saved credit card details or via PayPal are believed to be out of harm’s way.

World Economic Forum: Cyberthreats rising in prominence in global risk landscape

The latest survey marks a shift from optimism regarding technological risks in the previous years. The heightened levels of worry come on the back of an escalation in cybersecurity threats, which, as noted by the WEF, are growing in prevalence and in disruptive potential alike.

Carphone Warehouse faces hefty fine for 2015 breach

The attackers gained access to a range of customer data such as names, addresses, phone numbers, dates of birth, and marital status. Making matters worse, the historical payment card details of some 18,000 customers were also compromised.

Security event in Taiwan ‘rewards’ quiz winners with malware-laden USB drives

The distribution of the USB sticks was halted on December 12 after some of the quiz’s successful entrants reported that their rewards had been flagged by their security software as containing malware.

Tank-traps versus trappings in virtual currencies: A cybersecurity minefield

Bitcoin, the progenitor of the entire cryptocurrency boom and still the most popular virtual currency, experienced a truly heady run-up in value. Its price surge was punctuated with a crescendo midway through December, when a single bitcoin approached $20,000.

ESET research: Appearances are deceiving with Turla’s backdoor-laced Flash Player installer

In order to establish persistence on the system, the installer tampers with the operating system’s registry. It also creates an administrative account that allows remote access.

ESET Research: Wauchos now headed for extinction?

As Wauchos was sold on underground forums, there were various monetization schemes. One of them was to use the form grabber plugin to steal passwords for online accounts.

Follow us

Copyright © 2018 ESET, All Rights Reserved.