Tomáš Foltýn

Tomáš Foltýn

Editor-in-chief


Education: M.A. in translation and interpreting

Highlights of your career: Wearing two career hats for the better part of the past ten years while retaining a semblance of normality.

Position and history of ESET I joined ESET as a security writer in late 2017 after being bitten by the cybersecurity bug.

What malware do you hate the most Ransomware (for adding insult to injury, literally).

Favorite activities: Reading, cycling, travelling.

Golden rule for cyberspace? 'Distrust and caution are the parents of security.' Benjamin Franklin’s thoughtful advice from 300 years ago nicely applies to cyberspace.

When did you get your first computer and what kind was it? A gifted 386 PC in the mid-1990s. It worked a little erratically, though (or maybe it was a classic example of 'problem exists between keyboard and chair'?)

Favorite computer game / activity: I'm a bit of a power user of RSS feeds, which I use to indulge my news consumption habit while keeping empty ‘news calories’ at bay.


418 articles by Tomáš Foltýn

Researchers unveil Veil to make ‘private browsing more private’

Researchers unveil Veil to make ‘private browsing more private’

Researchers unveil Veil to make ‘private browsing more private’

The blinding server randomly adds some nonsense code to every webpage. This ‘code obfuscation’, according to the academics, has no effect on what the actual page looks like, but it drastically changes the appearance of the underlying source file.

Tomáš Foltýn28 Feb 20183 min. read


One-third of organizations sacrifice mobile security for business performance

One-third of organizations sacrifice mobile security for business performance

One-third of organizations sacrifice mobile security for business performance

Only one in seven organizations have put in place all four basic cybersecurity practices specified by Verizon – changing all default passwords, encrypting data transmitted over public networks, granting employee access on a need-to-know basis, and testing security systems regularly.

Tomáš Foltýn27 Feb 20182 min. read


Over 40% of online login attempts are attackers trying to invade accounts

Over 40% of online login attempts are attackers trying to invade accounts

Over 40% of online login attempts are attackers trying to invade accounts

Bots that traverse the internet on behalf of their human operators can fulfill both legitimate and malicious automated tasks. Statistics indicate that bot-driven internet traffic, by helper and harmful bots combined, surpasses human traffic.

Tomáš Foltýn26 Feb 20183 min. read


Survey shows sloppy password habits among young Brits

Survey shows sloppy password habits among young Brits

Survey shows sloppy password habits among young Brits

Young people were singled out as increasingly likely victims of internet-borne fraud, including because of their penchant for liberal sharing of personal information.

Tomáš Foltýn22 Feb 20182 min. read


Apple defuses ‘text bomb’ bug

Apple defuses ‘text bomb’ bug

Apple defuses ‘text bomb’ bug

A number of text-based apps crashed, became unresponsive or entered an endless bootloop when attempting to show the otherwise little-used character from a language that is spoken by some 75 million people.

Tomáš Foltýn21 Feb 20182 min. read


Cybercrime weighs most heavily on financial service firms

Cybercrime weighs most heavily on financial service firms

Cybercrime weighs most heavily on financial service firms

A further breakdown of the overall figures shows that, in all, the actual cost hinges on a number of variables. The factors that enter heavily into the equation include attack types and their frequency, along with the organization’s size and even the country in which an organization is based.

Tomáš Foltýn20 Feb 20182 min. read


Millions bagged in two bank cyber-heists

Millions bagged in two bank cyber-heists

Millions bagged in two bank cyber-heists

This hack is said to be reminiscent of a particularly brazen bank cyber-heist from February 2016, in which hackers successfully pilfered $81 million from the account of the central bank of Bangladesh at the Federal Reserve Bank of New York.

Tomáš Foltýn19 Feb 20182 min. read


US forms dedicated office to help avert cyberattacks on infrastructure

US forms dedicated office to help avert cyberattacks on infrastructure

US forms dedicated office to help avert cyberattacks on infrastructure

The vulnerability of critical infrastructure, including energy grids, to cyberattacks has been a growing concern worldwide. Many nations have been scrambling to improve their defenses vis-à-vis threats faced by services that are critical to the continuity of our daily lives.

Tomáš Foltýn16 Feb 20183 min. read


Concerns about data breaches hitting all-time high

Concerns about data breaches hitting all-time high

Concerns about data breaches hitting all-time high

A record-high proportion of organizations worldwide (67%) said that they had been breached at some point, up from 56% in the report’s previous edition.

Tomáš Foltýn15 Feb 20182 min. read