Mikko Hypponen

@mikko

CRO at F-Secure ● TED Speaker ● Malware Adventurer

Photos and Videos by @mikko

  • Timeline
  • Gallery

Technical Mujahideen magazine: how to use rootkits to hide incriminating data.

  • 941 days ago via site
  • 830

Technical Mujahideen magazine: how to use a simple form of steganography to hide information in innocent data files. In this example, an innocent PDF file.

  • 941 days ago via site
  • 866

Technical Mujahideen magazine: how to use Windows file system ADSs (alternative data streams) as a simple way of hiding evidence on a computer.

  • 941 days ago via site
  • 55

Technical Mujahideen. Extremist hacking magazine in Arabic.

  • 941 days ago via site
  • 70

Asrar al-Mujahideen aka Mojahedeen secrets. Al-Qaeda public-key encryption software with several strong encryption algorithms.

  • 941 days ago via site
  • 87

This is what the carding sites taken down by SOCA look like now.

  • 946 days ago via site
  • 93

File which has been blocked 452 times today.

  • 958 days ago via site
  • 106

Global Payments have modified the messages on http://2012infosecurityupdate.com

  • 961 days ago via site
  • 77

here's a screenshot from opensc.ws.

This is what the error message shown by 'Girls Around' app looks like after Foursquare killed their API access

Today's graph for Global Payment's stock value and trading volume. Down 9% right now. #breach

Hey

Malicious Android applications in Google Play (Android Market) by "MCC APP".

  • 976 days ago via site
  • 45

It's a pen.

  • 977 days ago via site
  • 289

This was taken during the photoshoot for Wired. The photographer here is Marco Grizelj from Aorta - see http://www.aorta.se
I believe the camera was a Hasselblad H4D-60, which takes 60 mexapixel images. Suggested retail price around 30,000€.

  • 979 days ago via site
  • 1,068

I'll reply with a picture of my socks.

Zombie Infection Kit admin interface

  • 988 days ago via site
  • 117

Login screen for the Crimepack exploit kit.

  • 988 days ago via site
  • 67

Online criminals target innocent end users with ransom trojans that will lock up the PC, claiming to represent various local law enforcement entities. In total, the reputation of 12 different police organizations are used in this scam.

  • 992 days ago via site
  • 327

Mikko Hypponen at TED

  • 995 days ago via site
  • 114