Enviar búsqueda
Cargar
SXSW - Mikko Hypponen
•
4 recomendaciones
•
3,077 vistas
Mikko Hypponen
Seguir
SXSW 2012 - Mikko Hypponen - "Memoirs of a Data Security streetfighter"
Leer menos
Leer más
Tecnología
Entretenimiento y humor
Denunciar
Compartir
Denunciar
Compartir
1 de 60
Recomendados
Vr cookies club
Vr cookies club
Cookies Club
Five eyes plus one vulnerabilities
Five eyes plus one vulnerabilities
AnonDownload
Five eyes plus one vulnerabilities
Five eyes plus one vulnerabilities
AnonDownload
My trouble with Adobe Flash
My trouble with Adobe Flash
Maso Lin
Skyfall
Skyfall
Nikki7497
Spain pp
Spain pp
William Roberts
Etech09:Japanese Tech Culture - Demystifying the Japanese weird toys and tools-
Etech09:Japanese Tech Culture - Demystifying the Japanese weird toys and tools-
Fumi Yamazaki
Tour Iraq with the 3rd Brigade, 101st Airborne
Tour Iraq with the 3rd Brigade, 101st Airborne
cshaver
Recomendados
Vr cookies club
Vr cookies club
Cookies Club
Five eyes plus one vulnerabilities
Five eyes plus one vulnerabilities
AnonDownload
Five eyes plus one vulnerabilities
Five eyes plus one vulnerabilities
AnonDownload
My trouble with Adobe Flash
My trouble with Adobe Flash
Maso Lin
Skyfall
Skyfall
Nikki7497
Spain pp
Spain pp
William Roberts
Etech09:Japanese Tech Culture - Demystifying the Japanese weird toys and tools-
Etech09:Japanese Tech Culture - Demystifying the Japanese weird toys and tools-
Fumi Yamazaki
Tour Iraq with the 3rd Brigade, 101st Airborne
Tour Iraq with the 3rd Brigade, 101st Airborne
cshaver
State of the Net
State of the Net
Mikko Hypponen
The Internet is on Fire - Mikko Hypponen at TEDxBrussels 2014
The Internet is on Fire - Mikko Hypponen at TEDxBrussels 2014
Mikko Hypponen
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]
Mikko Hypponen
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Mikko Hypponen
Living In A Surveillance State - TEDxBrussels 2013
Living In A Surveillance State - TEDxBrussels 2013
Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
Mikko Hypponen
Google Zeitgeist - Mikko Hypponen
Google Zeitgeist - Mikko Hypponen
Mikko Hypponen
TEDxRotterdam - Mikko Hypponen
TEDxRotterdam - Mikko Hypponen
Mikko Hypponen
TEDxHelsinki - Mikko Hypponen
TEDxHelsinki - Mikko Hypponen
Mikko Hypponen
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
Mikko Hypponen
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
UK Journal
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Antenna Manufacturer Coco
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Igalia
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
Más contenido relacionado
Más de Mikko Hypponen
State of the Net
State of the Net
Mikko Hypponen
The Internet is on Fire - Mikko Hypponen at TEDxBrussels 2014
The Internet is on Fire - Mikko Hypponen at TEDxBrussels 2014
Mikko Hypponen
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]
Mikko Hypponen
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Mikko Hypponen
Living In A Surveillance State - TEDxBrussels 2013
Living In A Surveillance State - TEDxBrussels 2013
Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
Mikko Hypponen
Google Zeitgeist - Mikko Hypponen
Google Zeitgeist - Mikko Hypponen
Mikko Hypponen
TEDxRotterdam - Mikko Hypponen
TEDxRotterdam - Mikko Hypponen
Mikko Hypponen
TEDxHelsinki - Mikko Hypponen
TEDxHelsinki - Mikko Hypponen
Mikko Hypponen
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
Mikko Hypponen
Más de Mikko Hypponen
(10)
State of the Net
State of the Net
The Internet is on Fire - Mikko Hypponen at TEDxBrussels 2014
The Internet is on Fire - Mikko Hypponen at TEDxBrussels 2014
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Living In A Surveillance State - TEDxBrussels 2013
Living In A Surveillance State - TEDxBrussels 2013
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
Google Zeitgeist - Mikko Hypponen
Google Zeitgeist - Mikko Hypponen
TEDxRotterdam - Mikko Hypponen
TEDxRotterdam - Mikko Hypponen
TEDxHelsinki - Mikko Hypponen
TEDxHelsinki - Mikko Hypponen
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
Último
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
UK Journal
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Antenna Manufacturer Coco
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Igalia
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Khem
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Digital Insurer
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Último
(20)
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
SXSW - Mikko Hypponen
1.
SXSW 2012 Mikko Hypponen F.Secure
2.
Memoirs of a
Data Security Street Fighter Mikko Hypponen CRO, F-Secure Corp twitter.com/mikko Protecting the irreplaceable | f-secure.com
3.
Protecting the irreplaceable
| f-secure.com
4.
1986
5.
6.
6
7.
8.
730 nizam block
allama iqbal town
9.
9
10.
1986 Brain
11.
1987 Stoned
12.
1987 Cascade
13.
1989 Yankee Doodle
14.
1991
Omega 13th of September 1991
15.
16.
1992 Michelangelo
17.
1992 V-Sign
18.
1992 VCL
19.
1992
20.
1993 Monkey
21.
1995 Concept
22.
1996 Laroux
23.
1998 Marburg
24.
25.
1998 Happy99
26.
1999 Melissa
27.
2000 Loveletter [ aka ILOVEYOU
]
28.
2001 Annakournikova [ aka VBSWG.ASDF
]
29.
2001
30.
2001 Code Red
31.
2002 Slapper
32.
2003 Slammer
33.
2003 Blaster
34.
2004 Sasser
35.
36.
•
00:00:55 00:00:00 00:00:05 00:00:10 00:00:15 00:00:20 00:00:25 00:00:30 00:00:35 00:00:40 00:00:45 00:00:50
37.
38.
39.
Air Canada
40.
41.
42.
43.
44.
45.
46.
2003 Fizzer
47.
2003 Sobig
48.
2004 Mydoom
49.
2004 Bagle
50.
2004 Netsky
51.
2003 Cabir
52.
2005 Sony Rootkit
53.
54.
2007 Storm Worm
55.
2007 Ikee / Duh
56.
57.
2009 Conficker
58.
2010 Stuxnet
59.
2011 Duqu
60.
Memoirs of a
Data Security Street Fighter Mikko Hypponen CRO, F-Secure Corp twitter.com/mikko Protecting the irreplaceable | f-secure.com