Mikko HypponenCRO, F-Secure         twitter.com/mikkoProtecting the irreplaceable | f-secure.com                          ...
• 23 May, 2012
• 23 May, 2012
The Three Main Sources of Cyber Attacks  Criminals         Hactivists      Governments
Organized Online CriminalsProtecting the irreplaceable | f-secure.com
Apply for the courierposition to receiveparcels ordered by ourclients worldwide atyour address. Get paidfor every parcel y...
"qruiokd"
Ransom TrojansProtecting the irreplaceable | f-secure.com
MobileProtecting the irreplaceable | f-secure.com
http://www.f-secure.com/weblog
Protecting the irreplaceable | f-secure.com
Protecting the irreplaceable | f-secure.com
Good vs Bad
Malware distribution        Malware distributionacross computer platforms   across smartphone platformsMicrosoft   Apple  ...
HactivistsProtecting the irreplaceable | f-secure.com
Governmental AttacksProtecting the irreplaceable | f-secure.com
HTranJoe Stewart, Dell Secureworks
HTranJoe Stewart, Dell Secureworks
Protecting the irreplaceable | f-secure.com
Protecting the irreplaceable | f-secure.com
Who fights the attackers?POLICE          POLICE                            ?
Mikko HypponenCRO, F-Secure         twitter.com/mikkoProtecting the irreplaceable | f-secure.com                          ...
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
Upcoming SlideShare
Loading in...5
×

AusCERT - Mikko Hypponen

22,152

Published on

AusCERT 2012 Keynote - Mikko Hypponen: The Enemy. May 2012, Gold Coast, Australia.

Published in: Technology, News & Politics
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
22,152
On Slideshare
0
From Embeds
0
Number of Embeds
6
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

AusCERT - Mikko Hypponen

  1. 1. Mikko HypponenCRO, F-Secure twitter.com/mikkoProtecting the irreplaceable | f-secure.com Mob. Mac. Mil.
  2. 2. • 23 May, 2012
  3. 3. • 23 May, 2012
  4. 4. The Three Main Sources of Cyber Attacks Criminals Hactivists Governments
  5. 5. Organized Online CriminalsProtecting the irreplaceable | f-secure.com
  6. 6. Apply for the courierposition to receiveparcels ordered by ourclients worldwide atyour address. Get paidfor every parcel youreceive!You will receive up to 25parcels weekly, we willask you to send them tous within 1-2 days. Youwill receive pre-paidlabels for every parcelyou send out.
  7. 7. "qruiokd"
  8. 8. Ransom TrojansProtecting the irreplaceable | f-secure.com
  9. 9. MobileProtecting the irreplaceable | f-secure.com
  10. 10. http://www.f-secure.com/weblog
  11. 11. Protecting the irreplaceable | f-secure.com
  12. 12. Protecting the irreplaceable | f-secure.com
  13. 13. Good vs Bad
  14. 14. Malware distribution Malware distributionacross computer platforms across smartphone platformsMicrosoft Apple Linux Microsoft Apple Linux
  15. 15. HactivistsProtecting the irreplaceable | f-secure.com
  16. 16. Governmental AttacksProtecting the irreplaceable | f-secure.com
  17. 17. HTranJoe Stewart, Dell Secureworks
  18. 18. HTranJoe Stewart, Dell Secureworks
  19. 19. Protecting the irreplaceable | f-secure.com
  20. 20. Protecting the irreplaceable | f-secure.com
  21. 21. Who fights the attackers?POLICE POLICE ?
  22. 22. Mikko HypponenCRO, F-Secure twitter.com/mikkoProtecting the irreplaceable | f-secure.com Mob. Mac. Mil.

×