Tomáš Foltýn

Tomáš Foltýn

Editor-in-chief


Education: M.A. in translation and interpreting

Highlights of your career: Wearing two career hats for the better part of the past ten years while retaining a semblance of normality.

Position and history of ESET I joined ESET as a security writer in late 2017 after being bitten by the cybersecurity bug.

What malware do you hate the most Ransomware (for adding insult to injury, literally).

Favorite activities: Reading, cycling, travelling.

Golden rule for cyberspace? 'Distrust and caution are the parents of security.' Benjamin Franklin’s thoughtful advice from 300 years ago nicely applies to cyberspace.

When did you get your first computer and what kind was it? A gifted 386 PC in the mid-1990s. It worked a little erratically, though (or maybe it was a classic example of 'problem exists between keyboard and chair'?)

Favorite computer game / activity: I'm a bit of a power user of RSS feeds, which I use to indulge my news consumption habit while keeping empty ‘news calories’ at bay.


411 articles by Tomáš Foltýn

How to talk about climate change – and what motivates people to action: An interview with Katharine Hayhoe

How to talk about climate change – and what motivates people to action: An interview with Katharine Hayhoe

How to talk about climate change – and what motivates people to action: An interview with Katharine Hayhoe

We spoke to climate scientist Katharine Hayhoe about climate change, faith and psychology – and how to channel anxiety about the state of our planet into meaningful action

Tomáš Foltýn10 May 202416 min. read


The hacker’s toolkit: 4 gadgets that could spell security trouble

The hacker’s toolkit: 4 gadgets that could spell security trouble

The hacker’s toolkit: 4 gadgets that could spell security trouble

Their innocuous looks and endearing names mask their true power. These gadgets are designed to help identify and prevent security woes, but what if they fall into the wrong hands?

Tomáš Foltýn06 May 20245 min. read


7 reasons why cybercriminals want your personal data

7 reasons why cybercriminals want your personal data

7 reasons why cybercriminals want your personal data

Here's what drives cybercriminals to relentlessly target the personal information of other people – and why you need to guard your data like your life depends on it

Tomáš Foltýn08 Apr 20246 min. read


Cybercriminals play dirty: A look back at 10 cyber hits on the sporting world

Cybercriminals play dirty: A look back at 10 cyber hits on the sporting world

Cybercriminals play dirty: A look back at 10 cyber hits on the sporting world

This rundown of 10 cyberattacks against the sports industry shows why every team needs to keep its eyes on the ball when it comes to cybersecurity

Tomáš Foltýn28 Mar 20248 min. read


The art of digital sleuthing: How digital forensics unlocks the truth

The art of digital sleuthing: How digital forensics unlocks the truth

The art of digital sleuthing: How digital forensics unlocks the truth

Learn how the cyber variety of CSI works, from sizing up the crime scene and hunting for clues to piecing together the story that the data has to tell

Tomáš Foltýn14 Feb 20246 min. read


Left to their own devices: Security for employees using personal devices for work

Left to their own devices: Security for employees using personal devices for work

Left to their own devices: Security for employees using personal devices for work

As personal devices within corporate networks make for a potentially combustible mix, a cavalier approach to BYOD security won’t cut it

Tomáš Foltýn06 Feb 20246 min. read


A peek behind the curtain: How are sock puppet accounts used in OSINT?

A peek behind the curtain: How are sock puppet accounts used in OSINT?

A peek behind the curtain: How are sock puppet accounts used in OSINT?

How wearing a ‘sock puppet’ can aid the collection of open source intelligence while insulating the ‘puppeteer’ from risks

Tomáš Foltýn11 Jan 20244 min. read


Say what you will? Your favorite speech-to-text app may be a privacy risk

Say what you will? Your favorite speech-to-text app may be a privacy risk

Say what you will? Your favorite speech-to-text app may be a privacy risk

Typing with your voice? It should go without saying that you need to take some precautions and avoid spilling your secrets.

Tomáš Foltýn03 Jan 20244 min. read


Think before you scan: How fraudsters can exploit QR codes to steal your money

Think before you scan: How fraudsters can exploit QR codes to steal your money

Think before you scan: How fraudsters can exploit QR codes to steal your money

QR codes are all the rage and scammers have taken notice. Look out for dangers lurking behind those little black-and-white squares.

Tomáš Foltýn04 Feb 20225 min. read