Mikko Hypponen

@mikko

CRO at F-Secure ● TED Speaker ● Malware Adventurer

Photos and Videos by @mikko

  • Timeline
  • Gallery

Technical Mujahideen magazine: how to use rootkits to hide incriminating data.

  • 907 days ago via site
  • 826

Technical Mujahideen magazine: how to use a simple form of steganography to hide information in innocent data files. In this example, an innocent PDF file.

  • 907 days ago via site
  • 862

Technical Mujahideen magazine: how to use Windows file system ADSs (alternative data streams) as a simple way of hiding evidence on a computer.

  • 907 days ago via site
  • 51

Technical Mujahideen. Extremist hacking magazine in Arabic.

  • 907 days ago via site
  • 68

Asrar al-Mujahideen aka Mojahedeen secrets. Al-Qaeda public-key encryption software with several strong encryption algorithms.

  • 907 days ago via site
  • 82

This is what the carding sites taken down by SOCA look like now.

  • 912 days ago via site
  • 90

File which has been blocked 452 times today.

  • 924 days ago via site
  • 103

Global Payments have modified the messages on http://2012infosecurityupdate.com

  • 927 days ago via site
  • 74

here's a screenshot from opensc.ws.

This is what the error message shown by 'Girls Around' app looks like after Foursquare killed their API access

Today's graph for Global Payment's stock value and trading volume. Down 9% right now. #breach

Hey

Malicious Android applications in Google Play (Android Market) by "MCC APP".

  • 942 days ago via site
  • 42

It's a pen.

  • 943 days ago via site
  • 285

This was taken during the photoshoot for Wired. The photographer here is Marco Grizelj from Aorta - see http://www.aorta.se
I believe the camera was a Hasselblad H4D-60, which takes 60 mexapixel images. Suggested retail price around 30,000€.

  • 945 days ago via site
  • 1,066

I'll reply with a picture of my socks.

Zombie Infection Kit admin interface

  • 954 days ago via site
  • 112

Login screen for the Crimepack exploit kit.

  • 954 days ago via site
  • 64

Online criminals target innocent end users with ransom trojans that will lock up the PC, claiming to represent various local law enforcement entities. In total, the reputation of 12 different police organizations are used in this scam.

  • 957 days ago via site
  • 322

Mikko Hypponen at TED

  • 961 days ago via site
  • 104