Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.

AusCERT - Mikko Hypponen

AusCERT 2012 Keynote - Mikko Hypponen: The Enemy. May 2012, Gold Coast, Australia.

  • Sé el primero en comentar

AusCERT - Mikko Hypponen

  1. 1. Mikko HypponenCRO, F-Secure twitter.com/mikkoProtecting the irreplaceable | f-secure.com Mob. Mac. Mil.
  2. 2. • 23 May, 2012
  3. 3. • 23 May, 2012
  4. 4. The Three Main Sources of Cyber Attacks Criminals Hactivists Governments
  5. 5. Organized Online CriminalsProtecting the irreplaceable | f-secure.com
  6. 6. Apply for the courierposition to receiveparcels ordered by ourclients worldwide atyour address. Get paidfor every parcel youreceive!You will receive up to 25parcels weekly, we willask you to send them tous within 1-2 days. Youwill receive pre-paidlabels for every parcelyou send out.
  7. 7. "qruiokd"
  8. 8. Ransom TrojansProtecting the irreplaceable | f-secure.com
  9. 9. MobileProtecting the irreplaceable | f-secure.com
  10. 10. http://www.f-secure.com/weblog
  11. 11. Protecting the irreplaceable | f-secure.com
  12. 12. Protecting the irreplaceable | f-secure.com
  13. 13. Good vs Bad
  14. 14. Malware distribution Malware distributionacross computer platforms across smartphone platformsMicrosoft Apple Linux Microsoft Apple Linux
  15. 15. HactivistsProtecting the irreplaceable | f-secure.com
  16. 16. Governmental AttacksProtecting the irreplaceable | f-secure.com
  17. 17. HTranJoe Stewart, Dell Secureworks
  18. 18. HTranJoe Stewart, Dell Secureworks
  19. 19. Protecting the irreplaceable | f-secure.com
  20. 20. Protecting the irreplaceable | f-secure.com
  21. 21. Who fights the attackers?POLICE POLICE ?
  22. 22. Mikko HypponenCRO, F-Secure twitter.com/mikkoProtecting the irreplaceable | f-secure.com Mob. Mac. Mil.

×