Mikko Hypponen


CRO at F-Secure ● TED Speaker ● Malware Adventurer

Photos and Videos by @mikko

  • Timeline
  • Gallery

Technical Mujahideen magazine: how to use rootkits to hide incriminating data.

  • 1640 days ago via site
  • 886

Technical Mujahideen magazine: how to use a simple form of steganography to hide information in innocent data files. In this example, an innocent PDF file.

  • 1640 days ago via site
  • 928

Technical Mujahideen magazine: how to use Windows file system ADSs (alternative data streams) as a simple way of hiding evidence on a computer.

  • 1640 days ago via site
  • 73

Technical Mujahideen. Extremist hacking magazine in Arabic.

  • 1640 days ago via site
  • 88

Asrar al-Mujahideen aka Mojahedeen secrets. Al-Qaeda public-key encryption software with several strong encryption algorithms.

  • 1640 days ago via site
  • 128

This is what the carding sites taken down by SOCA look like now.

  • 1644 days ago via site
  • 112

File which has been blocked 452 times today.

  • 1657 days ago via site
  • 125

Global Payments have modified the messages on http://2012infosecurityupdate.com

  • 1659 days ago via site
  • 103

here's a screenshot from opensc.ws.

This is what the error message shown by 'Girls Around' app looks like after Foursquare killed their API access

Today's graph for Global Payment's stock value and trading volume. Down 9% right now. #breach


Malicious Android applications in Google Play (Android Market) by "MCC APP".

  • 1675 days ago via site
  • 67

It's a pen.

  • 1675 days ago via site
  • 329

This was taken during the photoshoot for Wired. The photographer here is Marco Grizelj from Aorta - see http://www.aorta.se
I believe the camera was a Hasselblad H4D-60, which takes 60 mexapixel images. Suggested retail price around 30,000€.

  • 1677 days ago via site
  • 1,104

I'll reply with a picture of my socks.

Zombie Infection Kit admin interface

  • 1687 days ago via site
  • 205

Login screen for the Crimepack exploit kit.

  • 1687 days ago via site
  • 143

Online criminals target innocent end users with ransom trojans that will lock up the PC, claiming to represent various local law enforcement entities. In total, the reputation of 12 different police organizations are used in this scam.

  • 1690 days ago via site
  • 435

Mikko Hypponen at TED

  • 1694 days ago via site
  • 216