Tomáš Foltýn

Tomáš Foltýn

Editor-in-chief


Education: M.A. in translation and interpreting

Highlights of your career: Wearing two career hats for the better part of the past ten years while retaining a semblance of normality.

Position and history of ESET I joined ESET as a security writer in late 2017 after being bitten by the cybersecurity bug.

What malware do you hate the most Ransomware (for adding insult to injury, literally).

Favorite activities: Reading, cycling, travelling.

Golden rule for cyberspace? 'Distrust and caution are the parents of security.' Benjamin Franklin’s thoughtful advice from 300 years ago nicely applies to cyberspace.

When did you get your first computer and what kind was it? A gifted 386 PC in the mid-1990s. It worked a little erratically, though (or maybe it was a classic example of 'problem exists between keyboard and chair'?)

Favorite computer game / activity: I'm a bit of a power user of RSS feeds, which I use to indulge my news consumption habit while keeping empty ‘news calories’ at bay.


414 articles by Tomáš Foltýn

One in five healthcare employees willing to sell patient data, study finds

One in five healthcare employees willing to sell patient data, study finds

One in five healthcare employees willing to sell patient data, study finds

The problem was particularly acute among provider organizations, as opposed to payer organizations (21% vs. 12%). Also, and perhaps counterintuitively, staff with more frequent cybersecurity training were more inclined to such practices.

Tomáš Foltýn09 Mar 20182 min. read


New DDoS attack method breaks record again, adds extortion

New DDoS attack method breaks record again, adds extortion

New DDoS attack method breaks record again, adds extortion

DDoS mitigation service Arbor Networks has announced that an undisclosed US company has suffered an attack fueled by internet-facing Memcached servers that clocked in at 1.7 terabits per second (Tbps), beating the previous record of 1.35 Tbps.

Tomáš Foltýn08 Mar 20183 min. read


Global police test their cyber-chops in simulated IoT attack

Global police test their cyber-chops in simulated IoT attack

Global police test their cyber-chops in simulated IoT attack

More than three dozen cybercrime and digital forensics experts from 23 countries have investigated a simulated attack on a bank that had been carried out through an IoT device.

Tomáš Foltýn05 Mar 20182 min. read


GitHub knocked briefly offline by biggest DDoS attack ever

GitHub knocked briefly offline by biggest DDoS attack ever

GitHub knocked briefly offline by biggest DDoS attack ever

At its peak, inbound traffic reached a staggering 1.35 terabits per second (Tbps), outflanking the previously record-setting assault of 1 Tbps at French web hosting provider OVH in September 2016.

Tomáš Foltýn02 Mar 20182 min. read


The rise of AI needs to be controlled, report warns

The rise of AI needs to be controlled, report warns

The rise of AI needs to be controlled, report warns

The experts urge policy-makers to work closely with technical researchers, computer scientists and the cybersecurity community to investigate, understand and prepare for possible malicious uses of AI.

Tomáš Foltýn02 Mar 20183 min. read


Researchers unveil Veil to make ‘private browsing more private’

Researchers unveil Veil to make ‘private browsing more private’

Researchers unveil Veil to make ‘private browsing more private’

The blinding server randomly adds some nonsense code to every webpage. This ‘code obfuscation’, according to the academics, has no effect on what the actual page looks like, but it drastically changes the appearance of the underlying source file.

Tomáš Foltýn28 Feb 20183 min. read


One-third of organizations sacrifice mobile security for business performance

One-third of organizations sacrifice mobile security for business performance

One-third of organizations sacrifice mobile security for business performance

Only one in seven organizations have put in place all four basic cybersecurity practices specified by Verizon – changing all default passwords, encrypting data transmitted over public networks, granting employee access on a need-to-know basis, and testing security systems regularly.

Tomáš Foltýn27 Feb 20182 min. read


Over 40% of online login attempts are attackers trying to invade accounts

Over 40% of online login attempts are attackers trying to invade accounts

Over 40% of online login attempts are attackers trying to invade accounts

Bots that traverse the internet on behalf of their human operators can fulfill both legitimate and malicious automated tasks. Statistics indicate that bot-driven internet traffic, by helper and harmful bots combined, surpasses human traffic.

Tomáš Foltýn26 Feb 20183 min. read


Survey shows sloppy password habits among young Brits

Survey shows sloppy password habits among young Brits

Survey shows sloppy password habits among young Brits

Young people were singled out as increasingly likely victims of internet-borne fraud, including because of their penchant for liberal sharing of personal information.

Tomáš Foltýn22 Feb 20182 min. read