Mikko Hypponen

@mikko

CRO at F-Secure ● TED Speaker ● Malware Adventurer

Photos and Videos by @mikko

  • Timeline
  • Gallery

Technical Mujahideen magazine: how to use rootkits to hide incriminating data.

  • 1085 days ago via site
  • 842

Technical Mujahideen magazine: how to use a simple form of steganography to hide information in innocent data files. In this example, an innocent PDF file.

  • 1085 days ago via site
  • 883

Technical Mujahideen magazine: how to use Windows file system ADSs (alternative data streams) as a simple way of hiding evidence on a computer.

  • 1085 days ago via site
  • 61

Technical Mujahideen. Extremist hacking magazine in Arabic.

  • 1085 days ago via site
  • 75

Asrar al-Mujahideen aka Mojahedeen secrets. Al-Qaeda public-key encryption software with several strong encryption algorithms.

  • 1085 days ago via site
  • 98

This is what the carding sites taken down by SOCA look like now.

  • 1090 days ago via site
  • 97

File which has been blocked 452 times today.

  • 1102 days ago via site
  • 113

Global Payments have modified the messages on http://2012infosecurityupdate.com

  • 1105 days ago via site
  • 83

here's a screenshot from opensc.ws.

This is what the error message shown by 'Girls Around' app looks like after Foursquare killed their API access

Today's graph for Global Payment's stock value and trading volume. Down 9% right now. #breach

Hey

Malicious Android applications in Google Play (Android Market) by "MCC APP".

  • 1120 days ago via site
  • 53

It's a pen.

  • 1121 days ago via site
  • 299

This was taken during the photoshoot for Wired. The photographer here is Marco Grizelj from Aorta - see http://www.aorta.se
I believe the camera was a Hasselblad H4D-60, which takes 60 mexapixel images. Suggested retail price around 30,000€.

  • 1122 days ago via site
  • 1,080

I'll reply with a picture of my socks.

Zombie Infection Kit admin interface

  • 1132 days ago via site
  • 124

Login screen for the Crimepack exploit kit.

  • 1132 days ago via site
  • 80

Online criminals target innocent end users with ransom trojans that will lock up the PC, claiming to represent various local law enforcement entities. In total, the reputation of 12 different police organizations are used in this scam.

  • 1135 days ago via site
  • 344

Mikko Hypponen at TED

  • 1139 days ago via site
  • 128