AusCERT - Mikko Hypponen

22,415 views
22,349 views

Published on

AusCERT 2012 Keynote - Mikko Hypponen: The Enemy. May 2012, Gold Coast, Australia.

Published in: Technology, News & Politics
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
22,415
On SlideShare
0
From Embeds
0
Number of Embeds
19,504
Actions
Shares
0
Downloads
0
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

AusCERT - Mikko Hypponen

  1. 1. Mikko HypponenCRO, F-Secure twitter.com/mikkoProtecting the irreplaceable | f-secure.com Mob. Mac. Mil.
  2. 2. • 23 May, 2012
  3. 3. • 23 May, 2012
  4. 4. The Three Main Sources of Cyber Attacks Criminals Hactivists Governments
  5. 5. Organized Online CriminalsProtecting the irreplaceable | f-secure.com
  6. 6. Apply for the courierposition to receiveparcels ordered by ourclients worldwide atyour address. Get paidfor every parcel youreceive!You will receive up to 25parcels weekly, we willask you to send them tous within 1-2 days. Youwill receive pre-paidlabels for every parcelyou send out.
  7. 7. "qruiokd"
  8. 8. Ransom TrojansProtecting the irreplaceable | f-secure.com
  9. 9. MobileProtecting the irreplaceable | f-secure.com
  10. 10. http://www.f-secure.com/weblog
  11. 11. Protecting the irreplaceable | f-secure.com
  12. 12. Protecting the irreplaceable | f-secure.com
  13. 13. Good vs Bad
  14. 14. Malware distribution Malware distributionacross computer platforms across smartphone platformsMicrosoft Apple Linux Microsoft Apple Linux
  15. 15. HactivistsProtecting the irreplaceable | f-secure.com
  16. 16. Governmental AttacksProtecting the irreplaceable | f-secure.com
  17. 17. HTranJoe Stewart, Dell Secureworks
  18. 18. HTranJoe Stewart, Dell Secureworks
  19. 19. Protecting the irreplaceable | f-secure.com
  20. 20. Protecting the irreplaceable | f-secure.com
  21. 21. Who fights the attackers?POLICE POLICE ?
  22. 22. Mikko HypponenCRO, F-Secure twitter.com/mikkoProtecting the irreplaceable | f-secure.com Mob. Mac. Mil.

×