Submit Search
Upload
SXSW - Mikko Hypponen
•
4 likes
•
3,077 views
Mikko Hypponen
Follow
SXSW 2012 - Mikko Hypponen - "Memoirs of a Data Security streetfighter"
Read less
Read more
Technology
Entertainment & Humor
Report
Share
Report
Share
1 of 60
Recommended
Vr cookies club
Vr cookies club
Cookies Club
Five eyes plus one vulnerabilities
Five eyes plus one vulnerabilities
AnonDownload
Five eyes plus one vulnerabilities
Five eyes plus one vulnerabilities
AnonDownload
My trouble with Adobe Flash
My trouble with Adobe Flash
Maso Lin
Skyfall
Skyfall
Nikki7497
Spain pp
Spain pp
William Roberts
Etech09:Japanese Tech Culture - Demystifying the Japanese weird toys and tools-
Etech09:Japanese Tech Culture - Demystifying the Japanese weird toys and tools-
Fumi Yamazaki
Tour Iraq with the 3rd Brigade, 101st Airborne
Tour Iraq with the 3rd Brigade, 101st Airborne
cshaver
More Related Content
More from Mikko Hypponen
State of the Net
State of the Net
Mikko Hypponen
The Internet is on Fire - Mikko Hypponen at TEDxBrussels 2014
The Internet is on Fire - Mikko Hypponen at TEDxBrussels 2014
Mikko Hypponen
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]
Mikko Hypponen
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Mikko Hypponen
Living In A Surveillance State - TEDxBrussels 2013
Living In A Surveillance State - TEDxBrussels 2013
Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
Mikko Hypponen
Google Zeitgeist - Mikko Hypponen
Google Zeitgeist - Mikko Hypponen
Mikko Hypponen
TEDxRotterdam - Mikko Hypponen
TEDxRotterdam - Mikko Hypponen
Mikko Hypponen
TEDxHelsinki - Mikko Hypponen
TEDxHelsinki - Mikko Hypponen
Mikko Hypponen
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
Mikko Hypponen
More from Mikko Hypponen
(10)
State of the Net
State of the Net
The Internet is on Fire - Mikko Hypponen at TEDxBrussels 2014
The Internet is on Fire - Mikko Hypponen at TEDxBrussels 2014
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Living In A Surveillance State - TEDxBrussels 2013
Living In A Surveillance State - TEDxBrussels 2013
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
Google Zeitgeist - Mikko Hypponen
Google Zeitgeist - Mikko Hypponen
TEDxRotterdam - Mikko Hypponen
TEDxRotterdam - Mikko Hypponen
TEDxHelsinki - Mikko Hypponen
TEDxHelsinki - Mikko Hypponen
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
Recently uploaded
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
Bachir Benyammi
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Aijun Zhang
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
David Newbury
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
Md Hossain Ali
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
Matsuo Lab
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
Daniel Santiago Silva Capera
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
bruanjhuli
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
Aggregage
Designing A Time bound resource download URL
Designing A Time bound resource download URL
Runcy Oommen
Nanopower In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
Pedro Manuel
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
UiPathCommunity
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
Seth Reyes
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
Mahmoud Rabie
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
Precisely
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
Liveplex
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
DianaGray10
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
DianaGray10
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
Eric D. Schabell
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Commit University
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
Udaiappa Ramachandran
Recently uploaded
(20)
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
Designing A Time bound resource download URL
Designing A Time bound resource download URL
Nanopower In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
SXSW - Mikko Hypponen
1.
SXSW 2012 Mikko Hypponen F.Secure
2.
Memoirs of a
Data Security Street Fighter Mikko Hypponen CRO, F-Secure Corp twitter.com/mikko Protecting the irreplaceable | f-secure.com
3.
Protecting the irreplaceable
| f-secure.com
4.
1986
6.
6
8.
730 nizam block
allama iqbal town
9.
9
10.
1986 Brain
11.
1987 Stoned
12.
1987 Cascade
13.
1989 Yankee Doodle
14.
1991
Omega 13th of September 1991
16.
1992 Michelangelo
17.
1992 V-Sign
18.
1992 VCL
19.
1992
20.
1993 Monkey
21.
1995 Concept
22.
1996 Laroux
23.
1998 Marburg
25.
1998 Happy99
26.
1999 Melissa
27.
2000 Loveletter [ aka ILOVEYOU
]
28.
2001 Annakournikova [ aka VBSWG.ASDF
]
29.
2001
30.
2001 Code Red
31.
2002 Slapper
32.
2003 Slammer
33.
2003 Blaster
34.
2004 Sasser
36.
•
00:00:55 00:00:00 00:00:05 00:00:10 00:00:15 00:00:20 00:00:25 00:00:30 00:00:35 00:00:40 00:00:45 00:00:50
39.
Air Canada
46.
2003 Fizzer
47.
2003 Sobig
48.
2004 Mydoom
49.
2004 Bagle
50.
2004 Netsky
51.
2003 Cabir
52.
2005 Sony Rootkit
54.
2007 Storm Worm
55.
2007 Ikee / Duh
57.
2009 Conficker
58.
2010 Stuxnet
59.
2011 Duqu
60.
Memoirs of a
Data Security Street Fighter Mikko Hypponen CRO, F-Secure Corp twitter.com/mikko Protecting the irreplaceable | f-secure.com