Credential‑stuffing attacks behind 30 billion login attempts in 2018
Streaming media feature among services that take the spotlight in a report on credential-stuffing attacks in 2018
Education: M.A. in translation and interpreting
Highlights of your career: Wearing two career hats as an in-house editor and as a freelance translator for the better part of the past ten years while retaining a semblance of normality.
Position and history of ESET I joined ESET as a security writer in late 2017 after being bitten by the cybersecurity bug.
What malware do you hate the most Ransomware, for adding insult to injury, literally.
Favorite activities: Reading, cycling, travelling.
Golden rule for cyberspace? 'Distrust and caution are the parents of security.' Benjamin Franklin’s thoughtful advice from 300 years ago nicely applies to cyberspace.
When did you get your first computer and what kind was it? A gifted 386 PC in the mid-1990s. It worked a little erratically, or it may have been a classic example of 'problem exists between keyboard and chair'.
Favorite computer game / activity: I'm a bit of a power user of RSS feeds, which I use to indulge my news consumption habit while keeping empty ‘news calories’ at bay.
Streaming media feature among services that take the spotlight in a report on credential-stuffing attacks in 2018
Tomáš FoltýnThe databases, sitting unprotected on cloud servers, contained reams of information amassed by two apps integrated with the social network
Tomáš FoltýnBithumb believes that, unlike in past incidents, this theft was the work of rogue insiders
Tomáš FoltýnAfter he was fired for poor performance, the ex-employee was back with a vengeance, literally
Tomáš FoltýnMore trouble in dark markets? A notorious black-market bazaar announces plans to close up shop on the same day that police announce the arrests of 61 people
Tomáš FoltýnThe electric automaker is working to release a fix for the underlying vulnerability in a matter of days
Tomáš FoltýnThe social network says that the passwords were never exposed externally and that it found no abuse of the glitch
Tomáš FoltýnOur penchant for plugging in random memory sticks isn’t the only trouble with our USB hygiene, a study shows
Tomáš FoltýnThe third penalty that Europe has levied on the tech giant in less than two years brings the total to €8.25 billion
Tomáš FoltýnIt’s prudent to get a security solution for your device, but a test by AV-Comparatives shows why you need to choose judiciously
Tomáš FoltýnThe repository of email addresses and other records would offer a gold mine of data for scammers
Tomáš FoltýnThe vulnerabilities, which resided in associated smartphone apps, were both easy to find and easy to fix
Tomáš FoltýnIt now turns out that the vulnerability in the browser was being exploited in tandem with a zero-day in Windows
Tomáš FoltýnThe latest report from the Anti-Phishing Working Group offers a mixed bag of findings about the phishing landscape in 2018
Tomáš FoltýnA ‘white hat’ from Argentina has come a long way since winning his first reward of US$50 in 2016
Tomáš FoltýnThe service became notorious for its use by ne’er-do-wells looking to make a quick buck by hijacking the processing power of victim machines to generate virtual money
Tomáš FoltýnWorse, attackers have already been spotted targeting the flaw to deliver cryptocurrency miners and other payloads
Tomáš FoltýnWith FIDO2 certification for Android, Google is setting the stage for password-less app and website sign-ins on a billion devices
Tomáš FoltýnThe keeper of the internet’s ‘phone book’ is urging a speedy adoption of security-enhancing DNS specifications
Tomáš FoltýnA new report shines some light on multiple aspects of the growing threat of cyber-extortion
Tomáš Foltýn