• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
AusCERT - Mikko Hypponen
 

AusCERT - Mikko Hypponen

on

  • 21,968 views

AusCERT 2012 Keynote - Mikko Hypponen: The Enemy. May 2012, Gold Coast, Australia.

AusCERT 2012 Keynote - Mikko Hypponen: The Enemy. May 2012, Gold Coast, Australia.

Statistics

Views

Total Views
21,968
Views on SlideShare
2,537
Embed Views
19,431

Actions

Likes
0
Downloads
0
Comments
0

32 Embeds 19,431

http://www.f-secure.com 17917
http://blog.f-secure.jp 1227
http://fsck2.f-secure.com 102
http://dedola.eu 28
http://grape 25
http://translate.googleusercontent.com 16
http://www.alliedvoa.com 14
http://security.excite.co.jp 9
http://www.the-ethical-hacker.com 9
http://newsblur.com 9
http://trojansvirusremoval.com 9
http://infosec.collected.info 8
http://127.0.0.1 7
http://webcache.googleusercontent.com 5
http://unhorse.rssing.com 5
http://207.46.192.232 5
http://sarevian.net 4
http://www.newsblur.com 4
http://www-ig-opensocial.googleusercontent.com 4
http://holisticinfosec.org 3
http://www.hanrss.com 3
http://embedded.dreamwidth.net 3
http://www.dedola.eu 2
http://localhost 2
http://intra.ulvila.fi 2
http://blog.isvoc.com 2
http://virusremovaltool.info 2
http://exelon769109.local 1
http://rss.ameba.jp 1
http://www.1001rss.com 1
http://securityboard.abxsec.com 1
http://10.0.0.31 1
More...

Accessibility

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    AusCERT - Mikko Hypponen AusCERT - Mikko Hypponen Presentation Transcript

    • Mikko HypponenCRO, F-Secure twitter.com/mikkoProtecting the irreplaceable | f-secure.com Mob. Mac. Mil.
    • • 23 May, 2012
    • • 23 May, 2012
    • The Three Main Sources of Cyber Attacks Criminals Hactivists Governments
    • Organized Online CriminalsProtecting the irreplaceable | f-secure.com
    • Apply for the courierposition to receiveparcels ordered by ourclients worldwide atyour address. Get paidfor every parcel youreceive!You will receive up to 25parcels weekly, we willask you to send them tous within 1-2 days. Youwill receive pre-paidlabels for every parcelyou send out.
    • "qruiokd"
    • Ransom TrojansProtecting the irreplaceable | f-secure.com
    • MobileProtecting the irreplaceable | f-secure.com
    • http://www.f-secure.com/weblog
    • Protecting the irreplaceable | f-secure.com
    • Protecting the irreplaceable | f-secure.com
    • Good vs Bad
    • Malware distribution Malware distributionacross computer platforms across smartphone platformsMicrosoft Apple Linux Microsoft Apple Linux
    • HactivistsProtecting the irreplaceable | f-secure.com
    • Governmental AttacksProtecting the irreplaceable | f-secure.com
    • HTranJoe Stewart, Dell Secureworks
    • HTranJoe Stewart, Dell Secureworks
    • Protecting the irreplaceable | f-secure.com
    • Protecting the irreplaceable | f-secure.com
    • Who fights the attackers?POLICE POLICE ?
    • Mikko HypponenCRO, F-Secure twitter.com/mikkoProtecting the irreplaceable | f-secure.com Mob. Mac. Mil.