Submit Search
Upload
SXSW - Mikko Hypponen
•
4 likes
•
3,077 views
Mikko Hypponen
Follow
SXSW 2012 - Mikko Hypponen - "Memoirs of a Data Security streetfighter"
Read less
Read more
Technology
Entertainment & Humor
Report
Share
Report
Share
1 of 60
Recommended
Vr cookies club
Vr cookies club
Cookies Club
Five eyes plus one vulnerabilities
Five eyes plus one vulnerabilities
AnonDownload
Five eyes plus one vulnerabilities
Five eyes plus one vulnerabilities
AnonDownload
My trouble with Adobe Flash
My trouble with Adobe Flash
Maso Lin
Skyfall
Skyfall
Nikki7497
Spain pp
Spain pp
William Roberts
Etech09:Japanese Tech Culture - Demystifying the Japanese weird toys and tools-
Etech09:Japanese Tech Culture - Demystifying the Japanese weird toys and tools-
Fumi Yamazaki
Tour Iraq with the 3rd Brigade, 101st Airborne
Tour Iraq with the 3rd Brigade, 101st Airborne
cshaver
More Related Content
More from Mikko Hypponen
State of the Net
State of the Net
Mikko Hypponen
The Internet is on Fire - Mikko Hypponen at TEDxBrussels 2014
The Internet is on Fire - Mikko Hypponen at TEDxBrussels 2014
Mikko Hypponen
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]
Mikko Hypponen
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Mikko Hypponen
Living In A Surveillance State - TEDxBrussels 2013
Living In A Surveillance State - TEDxBrussels 2013
Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
Mikko Hypponen
Google Zeitgeist - Mikko Hypponen
Google Zeitgeist - Mikko Hypponen
Mikko Hypponen
TEDxRotterdam - Mikko Hypponen
TEDxRotterdam - Mikko Hypponen
Mikko Hypponen
TEDxHelsinki - Mikko Hypponen
TEDxHelsinki - Mikko Hypponen
Mikko Hypponen
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
Mikko Hypponen
More from Mikko Hypponen
(10)
State of the Net
State of the Net
The Internet is on Fire - Mikko Hypponen at TEDxBrussels 2014
The Internet is on Fire - Mikko Hypponen at TEDxBrussels 2014
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Living In A Surveillance State - TEDxBrussels 2013
Living In A Surveillance State - TEDxBrussels 2013
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
Google Zeitgeist - Mikko Hypponen
Google Zeitgeist - Mikko Hypponen
TEDxRotterdam - Mikko Hypponen
TEDxRotterdam - Mikko Hypponen
TEDxHelsinki - Mikko Hypponen
TEDxHelsinki - Mikko Hypponen
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
Recently uploaded
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Commit University
Nanopower In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
Pedro Manuel
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
Daniel Santiago Silva Capera
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
Mahmoud Rabie
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?
SANGHEE SHIN
Introduction to Quantum Computing
Introduction to Quantum Computing
GDSC PJATK
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
Bachir Benyammi
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
bruanjhuli
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UbiTrack UK
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
DianaGray10
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
shyamraj55
Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.
francesco barbera
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IES VE
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
Aggregage
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
DianaGray10
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
SkyPlanner
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
dgelyza
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
Eric D. Schabell
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
Md Hossain Ali
Designing A Time bound resource download URL
Designing A Time bound resource download URL
Runcy Oommen
Recently uploaded
(20)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Nanopower In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?
Introduction to Quantum Computing
Introduction to Quantum Computing
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
Designing A Time bound resource download URL
Designing A Time bound resource download URL
SXSW - Mikko Hypponen
1.
SXSW 2012 Mikko Hypponen F.Secure
2.
Memoirs of a
Data Security Street Fighter Mikko Hypponen CRO, F-Secure Corp twitter.com/mikko Protecting the irreplaceable | f-secure.com
3.
Protecting the irreplaceable
| f-secure.com
4.
1986
6.
6
8.
730 nizam block
allama iqbal town
9.
9
10.
1986 Brain
11.
1987 Stoned
12.
1987 Cascade
13.
1989 Yankee Doodle
14.
1991
Omega 13th of September 1991
16.
1992 Michelangelo
17.
1992 V-Sign
18.
1992 VCL
19.
1992
20.
1993 Monkey
21.
1995 Concept
22.
1996 Laroux
23.
1998 Marburg
25.
1998 Happy99
26.
1999 Melissa
27.
2000 Loveletter [ aka ILOVEYOU
]
28.
2001 Annakournikova [ aka VBSWG.ASDF
]
29.
2001
30.
2001 Code Red
31.
2002 Slapper
32.
2003 Slammer
33.
2003 Blaster
34.
2004 Sasser
36.
•
00:00:55 00:00:00 00:00:05 00:00:10 00:00:15 00:00:20 00:00:25 00:00:30 00:00:35 00:00:40 00:00:45 00:00:50
39.
Air Canada
46.
2003 Fizzer
47.
2003 Sobig
48.
2004 Mydoom
49.
2004 Bagle
50.
2004 Netsky
51.
2003 Cabir
52.
2005 Sony Rootkit
54.
2007 Storm Worm
55.
2007 Ikee / Duh
57.
2009 Conficker
58.
2010 Stuxnet
59.
2011 Duqu
60.
Memoirs of a
Data Security Street Fighter Mikko Hypponen CRO, F-Secure Corp twitter.com/mikko Protecting the irreplaceable | f-secure.com