Remote access flaws found in popular routers, NAS devices
In almost all tested units, the researchers achieved their goal of obtaining remote root-level access
Education: M.A. in translation and interpreting
Highlights of your career: Wearing two career hats as an in-house editor and as a freelance translator for the better part of the past ten years while retaining a semblance of normality.
Position and history of ESET I joined ESET as a security writer in late 2017 after being bitten by the cybersecurity bug.
What malware do you hate the most Ransomware, for adding insult to injury, literally.
Favorite activities: Reading, cycling, travelling.
Golden rule for cyberspace? 'Distrust and caution are the parents of security.' Benjamin Franklin’s thoughtful advice from 300 years ago nicely applies to cyberspace.
When did you get your first computer and what kind was it? A gifted 386 PC in the mid-1990s. It worked a little erratically, or it may have been a classic example of 'problem exists between keyboard and chair'.
Favorite computer game / activity: I'm a bit of a power user of RSS feeds, which I use to indulge my news consumption habit while keeping empty ‘news calories’ at bay.
In almost all tested units, the researchers achieved their goal of obtaining remote root-level access
Tomáš FoltýnThe humongous collection of extensive personal details about millions of people could be a gold mine for scam artists
Tomáš FoltýnAre you – and especially your children – aware of the risks that may come with sharing selfies?
Tomáš FoltýnThe attack, which has victimized mostly smaller local governments, is thought to have been unleashed by a single threat actor
Tomáš FoltýnUnlike BlueKeep, however, these vulnerabilities affect more recent Windows versions, including Windows 10
Tomáš FoltýnThe legal action, brought over alleged click injection fraud, is said to be among the first of its kind
Tomáš FoltýnUp to 30 percent of romance fraud victims in 2018 are estimated to have been used as money mules
Tomáš FoltýnThe power utility appears to be well on track to a swift recovery following an attack that ultimately left some people without electricity
Tomáš FoltýnThe attack, unleashed by a 400,000-strong Mirai-style botnet, may be the largest of its kind on record
Tomáš FoltýnThe compromised company may bear the financial brunt of the breach within the first year after the incident occurs, but the price tag is still far from final
Tomáš FoltýnOn the flip side, there are currently no known cases of the vulnerability being exploited in the wild
Tomáš FoltýnKeeping up with BlueKeep; or how many internet-facing systems, and in which countries and industries, remain ripe for exploitation?
Tomáš FoltýnA researcher found that it was possible to subvert the platform’s password recovery mechanism and take control of user accounts
Tomáš FoltýnThe times they have a-changed since the ICO could only slap fines worth a fraction of the current amounts
Tomáš FoltýnA trifecta of issues impact the organization’s cyber-resilience and conspire to put it in the firing line of cyberattacks
Tomáš FoltýnThe leak, which has since been plugged, exposed a range of highly specific and sensitive information about users
Tomáš Foltýn“Sounds bad”, the former Equifax CIO wrote in a text after learning of the breach that ended up affecting almost half the US population
Tomáš FoltýnThe new feature is intended to protect the kind of data that you hold particularly dear
Tomáš FoltýnA few days apart, two cities in Florida cave in to extortionists’ demands in hopes of restoring access to municipal computer systems
Tomáš FoltýnThe infiltration was only spotted and stopped after the hackers roamed the network undetected for almost a year
Tomáš Foltýn