POPULARITY
Three Buddy Problem - Episode 49: Cybersecurity veteran Mikko Hypponen joins the show to discuss the fast-changing life and times on NATO's newest frontline, how Ukraine's long-range “Spiderweb” drone swarms punched holes in Russian air bases, the cyber connections to the escalating drone warfare, and the coming wave of autonomous “killer robots”. Plus, news on Ukraine's hack of bomber-maker Tupolev, the industry's never-ending APT naming mess, iVerify's newly disclosed iMessage zero-click bug, fresh Qualcomm GPU exploits still unpatched on Android devices, and Cellebrite's purchase of Corellium. Cast: Ryan Naraine (https://twitter.com/ryanaraine), Costin Raiu (https://twitter.com/craiu) and Mikko Hypponen (https://x.com/mikko) Juan Andres Guerrero-Saade is out this week at Sleuthcon.
Guest: Mikko Hypponen, Chief Research Officer (CRO) at WithSecure [@WithSecure]On LinkedIn | https://www.linkedin.com/in/hypponen/On Twitter | https://twitter.com/mikkoHosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesDuring the AISA CyberCon 2024 in Melbourne, Sean Martin and Marco Ciappelli sat down with Mikko Hypponen to discuss the irreversible nature of technology, the challenges it presents, and its impact on society. The discussion focused not on the event itself but on broader issues and ideas that shape our relationship with technological innovation.The Irreversible Nature of InnovationMikko emphasized that once a technology is invented, it cannot be uninvented. Strong encryption was one of his key examples: it secures communication for individuals and organizations, yet it is also used by criminals to evade detection. This duality underscores the reality that every innovation carries benefits and drawbacks. Mikko noted, “Even if we wanted to get rid of strong encryption, it's not possible. Criminals would still use it.”The conversation also touched on artificial intelligence. Mikko highlighted how innovations build on past advancements. Decades of progress in digitizing information, developing the internet, and creating cloud infrastructure have made today's AI capabilities possible. He reflected on how large technological revolutions often take longer than anticipated to develop but eventually surpass expectations in scope.Technology as a Double-Edged SwordThe group explored societal challenges posed by technology, such as the impact of social media on youth and ethical questions around ransomware. Mikko pointed to the breach of the Vastamo psychotherapy center in Finland, where hackers stole sensitive patient records and demanded ransoms from both the clinic and its patients. He argued that, in some cases, paying the ransom might result in less harm, even though it contradicts the principle of not funding criminal activity.Marco raised the issue of preparing young people for social media, comparing it to teaching a child to drive before handing over car keys. The discussion emphasized the importance of gradually introducing tools and systems while fostering understanding of their risks and responsibilities.Building on the PastMarco noted how foundational technologies, like the internet, enable further innovations. Mikko agreed, citing how AI's rapid rise was made possible by decades of previous work. He stressed that each technological leap requires the groundwork laid by earlier developments, creating platforms for new ideas to flourish.The group also discussed the limitations of regulation. For example, cryptocurrencies, built on mathematical principles, cannot be fundamentally altered by laws. Instead, regulation can only address interactions between real-world currencies and blockchain systems. Mikko observed, “Math doesn't care about your laws and regulations.”Closing ThoughtsThe conversation underscored that innovation is inherently a trade-off. Every advancement brings both opportunities and challenges, and society must navigate these complexities thoughtfully. Mikko highlighted that while the benefits of technologies like encryption, AI, and the internet are significant, they also create new risks.Sean, Marco, and Mikko's discussion emphasized the importance of understanding and adapting to technological change. While we can't control the pace of innovation, we can shape how it integrates into our lives and institutions. This ongoing dialogue remains essential as society continues to grapple with the implications of progress.____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More
Guest: Mikko Hypponen, Chief Research Officer (CRO) at WithSecure [@WithSecure]On LinkedIn | https://www.linkedin.com/in/hypponen/On Twitter | https://twitter.com/mikkoHosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesDuring the AISA CyberCon 2024 in Melbourne, Sean Martin and Marco Ciappelli sat down with Mikko Hypponen to discuss the irreversible nature of technology, the challenges it presents, and its impact on society. The discussion focused not on the event itself but on broader issues and ideas that shape our relationship with technological innovation.The Irreversible Nature of InnovationMikko emphasized that once a technology is invented, it cannot be uninvented. Strong encryption was one of his key examples: it secures communication for individuals and organizations, yet it is also used by criminals to evade detection. This duality underscores the reality that every innovation carries benefits and drawbacks. Mikko noted, “Even if we wanted to get rid of strong encryption, it's not possible. Criminals would still use it.”The conversation also touched on artificial intelligence. Mikko highlighted how innovations build on past advancements. Decades of progress in digitizing information, developing the internet, and creating cloud infrastructure have made today's AI capabilities possible. He reflected on how large technological revolutions often take longer than anticipated to develop but eventually surpass expectations in scope.Technology as a Double-Edged SwordThe group explored societal challenges posed by technology, such as the impact of social media on youth and ethical questions around ransomware. Mikko pointed to the breach of the Vastamo psychotherapy center in Finland, where hackers stole sensitive patient records and demanded ransoms from both the clinic and its patients. He argued that, in some cases, paying the ransom might result in less harm, even though it contradicts the principle of not funding criminal activity.Marco raised the issue of preparing young people for social media, comparing it to teaching a child to drive before handing over car keys. The discussion emphasized the importance of gradually introducing tools and systems while fostering understanding of their risks and responsibilities.Building on the PastMarco noted how foundational technologies, like the internet, enable further innovations. Mikko agreed, citing how AI's rapid rise was made possible by decades of previous work. He stressed that each technological leap requires the groundwork laid by earlier developments, creating platforms for new ideas to flourish.The group also discussed the limitations of regulation. For example, cryptocurrencies, built on mathematical principles, cannot be fundamentally altered by laws. Instead, regulation can only address interactions between real-world currencies and blockchain systems. Mikko observed, “Math doesn't care about your laws and regulations.”Closing ThoughtsThe conversation underscored that innovation is inherently a trade-off. Every advancement brings both opportunities and challenges, and society must navigate these complexities thoughtfully. Mikko highlighted that while the benefits of technologies like encryption, AI, and the internet are significant, they also create new risks.Sean, Marco, and Mikko's discussion emphasized the importance of understanding and adapting to technological change. While we can't control the pace of innovation, we can shape how it integrates into our lives and institutions. This ongoing dialogue remains essential as society continues to grapple with the implications of progress.____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More
Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesIn this pre-event Chats on the Road episode of the On Location with Sean and Marco Podcast, hosts Sean Martin and Marco Ciappelli meet up in person and on location to discuss their excitement and expectations for the upcoming Australia Cybersecurity Conference 2024 in Melbourne. They express their enthusiasm about reuniting with the cybersecurity community and emphasize the significance of the event, which is organized by AISA and supported by notable individuals like Akash Mattel, Megan, and Abbas Kudrati.Sean and Marco share a light-hearted opening conversation about boats and travels, setting a casual tone before diving into what they look forward to at the conference. The hosts appreciate the opportunity to connect with industry leaders and attendees, emphasizing the importance of stories in operationalizing cybersecurity in business and society.Sean highlights the need to align technology with business processes while adhering to policies and laws on a global scale. On the other hand, Marco provides a broader perspective on the interaction between individuals, society, and technology, stressing the role of cybersecurity in protecting personal privacy and fostering human interaction — it turns out it's all about the intersection of technology and culture.The hosts reflect on their past experiences in the cybersecurity field, with Sean sharing an anecdote about a vintage AV hat that represents his journey at Symantec rooted in the Australia. culture. This reflection underscores the value of learning from past and present experiences to shape a better future in cybersecurity.Sean and Marco discuss the diverse sessions and interactions planned for the event, mentioning notable speakers like Joe Sullivan and Mikko Hypponen. They are particularly excited about the wide range of topics to be covered, from policy and privacy to operational strategies and the human element in cybersecurity.As they anticipate the week ahead, Sean and Marco invite listeners to engage with them during the conference. They are eager to forge new relationships and gather stories that resonate on a global scale, underscoring the event's potential for fostering meaningful connections and enhancing cybersecurity practices worldwide.Tune in to hear Sean and Marco's thoughts on what promises to be an exciting and informative week at the Australia Cybersecurity Conference 2024. Whether you're attending the event or staying tuned from afar, this episode sets the stage for the compelling conversations and insights to come.____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________Learn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More
Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesIn this pre-event Chats on the Road episode of the On Location with Sean and Marco Podcast, hosts Sean Martin and Marco Ciappelli meet up in person and on location to discuss their excitement and expectations for the upcoming Australia Cybersecurity Conference 2024 in Melbourne. They express their enthusiasm about reuniting with the cybersecurity community and emphasize the significance of the event, which is organized by AISA and supported by notable individuals like Akash Mattel, Megan, and Abbas Kudrati.Sean and Marco share a light-hearted opening conversation about boats and travels, setting a casual tone before diving into what they look forward to at the conference. The hosts appreciate the opportunity to connect with industry leaders and attendees, emphasizing the importance of stories in operationalizing cybersecurity in business and society.Sean highlights the need to align technology with business processes while adhering to policies and laws on a global scale. On the other hand, Marco provides a broader perspective on the interaction between individuals, society, and technology, stressing the role of cybersecurity in protecting personal privacy and fostering human interaction — it turns out it's all about the intersection of technology and culture.The hosts reflect on their past experiences in the cybersecurity field, with Sean sharing an anecdote about a vintage AV hat that represents his journey at Symantec rooted in the Australia. culture. This reflection underscores the value of learning from past and present experiences to shape a better future in cybersecurity.Sean and Marco discuss the diverse sessions and interactions planned for the event, mentioning notable speakers like Joe Sullivan and Mikko Hypponen. They are particularly excited about the wide range of topics to be covered, from policy and privacy to operational strategies and the human element in cybersecurity.As they anticipate the week ahead, Sean and Marco invite listeners to engage with them during the conference. They are eager to forge new relationships and gather stories that resonate on a global scale, underscoring the event's potential for fostering meaningful connections and enhancing cybersecurity practices worldwide.Tune in to hear Sean and Marco's thoughts on what promises to be an exciting and informative week at the Australia Cybersecurity Conference 2024. Whether you're attending the event or staying tuned from afar, this episode sets the stage for the compelling conversations and insights to come.____________________________This Episode's SponsorsThreatlocker: https://itspm.ag/threatlocker-r974____________________________Learn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage?Learn More
Guest: Akash Mittal, CISO, Group Security, Sumitomo Forestry AustraliaOn LinkedIn | https://www.linkedin.com/in/akashgmittal/____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesWelcome to Melbourne for AU Cyber Con 2024From November 26th to 28th, Melbourne will transform into the epicenter of cybersecurity as it hosts AU Cyber Con 2024. Organized by the Australian Information Security Association (AISA), the conference brings a diverse lineup of global thought leaders and innovators to the stage, all focused on shaping the next wave of cybersecurity.Conference Highlights and ThemeThe theme, "The Future is Now," reflects the urgent need for organizations and individuals alike to adapt to our rapidly changing digital landscape. Over three days, the event will feature 440+ speakers and 350 sessions, offering a deep dive into the intersection of cybersecurity, society, and technology.Engage with Industry LeadersThis year's lineup includes top voices in cybersecurity and beyond, like former Facebook CSO Joe Sullivan, astronaut Jose Hernandez, and security icon Mikko Hypponen. With appearances from cultural figures such as actor Kal Penn, the event will highlight the broader societal impact of cybersecurity, demonstrating how it affects everything from the arts to government policy.Interactive Villages and Hands-On WorkshopsAU Cyber Con goes beyond the stage with interactive villages like the Careers Village, Lockpicking Village, and AI Village. Here, attendees can gain hands-on experience with everything from physical security tools to AI applications and prompt injections. For those interested in personal brand-building, industry insights, or getting into the nuts and bolts of cybersecurity, these workshops offer something for everyone.Spotlight on Sponsors and ExhibitorsWith support from over 150 exhibitors, the event provides a unique opportunity for attendees to connect with leading companies and uncover the latest in cybersecurity tech. For exhibitors, it's a valuable chance to meet professionals tackling real-world cybersecurity challenges head-on.Fostering Global CollaborationAU Cyber Con 2024 emphasizes the need for global teamwork to advance cybersecurity. Government representatives and international delegates will discuss strategic initiatives and regulatory advancements to strengthen cyber resilience. This gathering is the perfect platform to build connections, share ideas, and work toward a unified digital security future.Looking Ahead: Coverage from ITSPmagazineSean Martin and Marco Ciappelli will be covering AU Cyber Con in real time. Join us for pre-event discussions, live updates, and post-event insights—all crafted to keep you connected to the latest innovations and collaborations shaping the future of cybersecurity.____________________________This Episode's SponsorsTHREATLOCKER: https://itspm.ag/threatlocker-r974____________________________Learn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________ResourcesLearn more about HITRUST Collaborate 2024 and register for the conference: https://itspm.ag/asia24Learn more about and hear more stories from HITRUST: https://www.itspmagazine.com/directory/hitrust____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story as part of our event coverage?Learn More
Guest: Akash Mittal, CISO, Group Security, Sumitomo Forestry AustraliaOn LinkedIn | https://www.linkedin.com/in/akashgmittal/____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesWelcome to Melbourne for AU Cyber Con 2024From November 26th to 28th, Melbourne will transform into the epicenter of cybersecurity as it hosts AU Cyber Con 2024. Organized by the Australian Information Security Association (AISA), the conference brings a diverse lineup of global thought leaders and innovators to the stage, all focused on shaping the next wave of cybersecurity.Conference Highlights and ThemeThe theme, "The Future is Now," reflects the urgent need for organizations and individuals alike to adapt to our rapidly changing digital landscape. Over three days, the event will feature 440+ speakers and 350 sessions, offering a deep dive into the intersection of cybersecurity, society, and technology.Engage with Industry LeadersThis year's lineup includes top voices in cybersecurity and beyond, like former Facebook CSO Joe Sullivan, astronaut Jose Hernandez, and security icon Mikko Hypponen. With appearances from cultural figures such as actor Kal Penn, the event will highlight the broader societal impact of cybersecurity, demonstrating how it affects everything from the arts to government policy.Interactive Villages and Hands-On WorkshopsAU Cyber Con goes beyond the stage with interactive villages like the Careers Village, Lockpicking Village, and AI Village. Here, attendees can gain hands-on experience with everything from physical security tools to AI applications and prompt injections. For those interested in personal brand-building, industry insights, or getting into the nuts and bolts of cybersecurity, these workshops offer something for everyone.Spotlight on Sponsors and ExhibitorsWith support from over 150 exhibitors, the event provides a unique opportunity for attendees to connect with leading companies and uncover the latest in cybersecurity tech. For exhibitors, it's a valuable chance to meet professionals tackling real-world cybersecurity challenges head-on.Fostering Global CollaborationAU Cyber Con 2024 emphasizes the need for global teamwork to advance cybersecurity. Government representatives and international delegates will discuss strategic initiatives and regulatory advancements to strengthen cyber resilience. This gathering is the perfect platform to build connections, share ideas, and work toward a unified digital security future.Looking Ahead: Coverage from ITSPmagazineSean Martin and Marco Ciappelli will be covering AU Cyber Con in real time. Join us for pre-event discussions, live updates, and post-event insights—all crafted to keep you connected to the latest innovations and collaborations shaping the future of cybersecurity.____________________________This Episode's SponsorsTHREATLOCKER: https://itspm.ag/threatlocker-r974____________________________Learn more and catch more stories from Australian Cyber Conference 2024 coverage: https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australiaBe sure to share and subscribe!____________________________ResourcesLearn more about HITRUST Collaborate 2024 and register for the conference: https://itspm.ag/asia24Learn more about and hear more stories from HITRUST: https://www.itspmagazine.com/directory/hitrust____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story as part of our event coverage?Learn More
Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)Episode: Mikko Hypponen on a Decade of Corporate Ransomware AttacksPub date: 2024-05-13Cybersecurity pioneer Mikko Hypponen joins the Claroty Nexus live at the RSA Conference to discuss a decade of ransomware attacks against corporate networks. Hypponen is Chief Research Officer at WithSecure, the former F-Secure for Business. He has observed and analyzed malware from its infancy when it was a merely a means of disruption and attention-seeking to today's enormously profitable ransomware services and gangs . The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: Nexus: A Claroty Podcast (LS 32 · TOP 5% what is this?)Episode: Mikko Hypponen on a Decade of Corporate Ransomware AttacksPub date: 2024-05-13Cybersecurity pioneer Mikko Hypponen joins the Claroty Nexus live at the RSA Conference to discuss a decade of ransomware attacks against corporate networks. Hypponen is Chief Research Officer at WithSecure, the former F-Secure for Business. He has observed and analyzed malware from its infancy when it was a merely a means of disruption and attention-seeking to today's enormously profitable ransomware services and gangs . The podcast and artwork embedded on this page are from Claroty, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Cybersecurity pioneer Mikko Hypponen joins the Claroty Nexus live at the RSA Conference to discuss a decade of ransomware attacks against corporate networks. Hypponen is Chief Research Officer at WithSecure, the former F-Secure for Business. He has observed and analyzed malware from its infancy when it was a merely a means of disruption and attention-seeking to today's enormously profitable ransomware services and gangs .
In this RSAC 2024 South Stage Keynote, Mikko Hyppönen will look back at the past decade of ransomware evolution and explore how newer innovations, like AI, are shaping its future. Illuminating the Cybersecurity Path: A Conversation with Jeremiah Grossman Join us for a compelling episode featuring Jeremiah Grossman, a prominent figure in the cybersecurity landscape. As a recognized expert, Jeremiah has played a pivotal role in shaping the discourse around web security and risk management. Jeremiah's journey in cybersecurity is marked by a series of influential roles, including Chief of Security Strategy at SentinelOne and Founder of WhiteHat Security. With a focus on web application security, he has been a driving force in advocating for innovative approaches to protect organizations from cyber threats. In this episode, we explore Jeremiah's vast experience and delve into his insights on the ever-evolving cybersecurity challenges. From his early days as a hacker to his current position as a sought-after industry thought leader, Jeremiah shares valuable perspectives on the strategies and philosophies that underpin effective cybersecurity practices. As a pioneer in the field, Jeremiah has contributed significantly to the development of best practices for identifying and mitigating web-related vulnerabilities. Tune in to gain a deeper understanding of the evolving threat landscape and the proactive measures organizations can take to secure their digital assets. Whether you're a cybersecurity professional, tech enthusiast, or someone eager to comprehend the complexities of online security, this podcast with Jeremiah Grossman promises to be an illuminating exploration of the past, present, and future of cybersecurity. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-828
In this RSAC 2024 South Stage Keynote, Mikko Hyppönen will look back at the past decade of ransomware evolution and explore how newer innovations, like AI, are shaping its future. Show Notes: https://securityweekly.com/psw-828
In this RSAC 2024 South Stage Keynote, Mikko Hyppönen will look back at the past decade of ransomware evolution and explore how newer innovations, like AI, are shaping its future. Illuminating the Cybersecurity Path: A Conversation with Jeremiah Grossman Join us for a compelling episode featuring Jeremiah Grossman, a prominent figure in the cybersecurity landscape. As a recognized expert, Jeremiah has played a pivotal role in shaping the discourse around web security and risk management. Jeremiah's journey in cybersecurity is marked by a series of influential roles, including Chief of Security Strategy at SentinelOne and Founder of WhiteHat Security. With a focus on web application security, he has been a driving force in advocating for innovative approaches to protect organizations from cyber threats. In this episode, we explore Jeremiah's vast experience and delve into his insights on the ever-evolving cybersecurity challenges. From his early days as a hacker to his current position as a sought-after industry thought leader, Jeremiah shares valuable perspectives on the strategies and philosophies that underpin effective cybersecurity practices. As a pioneer in the field, Jeremiah has contributed significantly to the development of best practices for identifying and mitigating web-related vulnerabilities. Tune in to gain a deeper understanding of the evolving threat landscape and the proactive measures organizations can take to secure their digital assets. Whether you're a cybersecurity professional, tech enthusiast, or someone eager to comprehend the complexities of online security, this podcast with Jeremiah Grossman promises to be an illuminating exploration of the past, present, and future of cybersecurity. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-828
In this RSAC 2024 South Stage Keynote, Mikko Hyppönen will look back at the past decade of ransomware evolution and explore how newer innovations, like AI, are shaping its future. Show Notes: https://securityweekly.com/psw-828
Guest: Mikko Hypponen, Chief Research Officer (CRO) at WithSecure [@WithSecure]On LinkedIn | https://www.linkedin.com/in/hypponen/On Twitter | https://twitter.com/mikkoAt RSAC | https://www.rsaconference.com/experts/Mikko%20Hypponen____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesIn this new episode of On Location with Sean and Marco Podcast, the dynamic duo engage in an insightful conversation with Mikko Hypponen. Mikko shares his vast experience in the cybersecurity field, tracing back to the early days of malware on floppy disks in 1991. He emphasizes the importance of long-term dedication and expertise in becoming a global cybersecurity expert.The discussion explores the evolution of cybersecurity over the past three decades, highlighting the shift towards increased security on mobile devices compared to traditional computers. Mikko elaborates on the rise of corporate ransomware and the organized crime tactics employed by ransomware gangs. He underscores the significance of branding and reputation management within cybercrime circles.Sean and Marco inquire about the targets and methods employed by ransomware gangs, shedding light on the random and widespread nature of cyber attacks. Mikko shares insights on the vulnerability of organizations to exploits and the intricate dynamics of the ransomware ecosystem.The episode concludes with anticipation for Mikko's keynote address at the RSA Conference, where he promises surprises and intriguing revelations. Listeners are left with a sense of excitement and anticipation for the informative and engaging session at the conference. Overall, the episode offers a deep dive into the world of cybersecurity, featuring thought-provoking discussions and expert insights from Mikko Hypponen, setting the stage for a compelling and enriching podcast experience.Key Questions AddressedHow has cybersecurity evolved over the past three decades?What are the targets and methods employed by ransomware gangs?What surprises can we expect in the RSA Conference keynote?Be sure to follow our Coverage Journey and subscribe to our podcasts!____________________________Follow our RSA Conference USA 2024 coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageOn YouTube:
Guest: Mikko Hypponen, Chief Research Officer (CRO) at WithSecure [@WithSecure]On LinkedIn | https://www.linkedin.com/in/hypponen/On Twitter | https://twitter.com/mikkoAt RSAC | https://www.rsaconference.com/experts/Mikko%20Hypponen____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesIn this new episode of On Location with Sean and Marco Podcast, the dynamic duo engage in an insightful conversation with Mikko Hypponen. Mikko shares his vast experience in the cybersecurity field, tracing back to the early days of malware on floppy disks in 1991. He emphasizes the importance of long-term dedication and expertise in becoming a global cybersecurity expert.The discussion explores the evolution of cybersecurity over the past three decades, highlighting the shift towards increased security on mobile devices compared to traditional computers. Mikko elaborates on the rise of corporate ransomware and the organized crime tactics employed by ransomware gangs. He underscores the significance of branding and reputation management within cybercrime circles.Sean and Marco inquire about the targets and methods employed by ransomware gangs, shedding light on the random and widespread nature of cyber attacks. Mikko shares insights on the vulnerability of organizations to exploits and the intricate dynamics of the ransomware ecosystem.The episode concludes with anticipation for Mikko's keynote address at the RSA Conference, where he promises surprises and intriguing revelations. Listeners are left with a sense of excitement and anticipation for the informative and engaging session at the conference. Overall, the episode offers a deep dive into the world of cybersecurity, featuring thought-provoking discussions and expert insights from Mikko Hypponen, setting the stage for a compelling and enriching podcast experience.Key Questions AddressedHow has cybersecurity evolved over the past three decades?What are the targets and methods employed by ransomware gangs?What surprises can we expect in the RSA Conference keynote?Be sure to follow our Coverage Journey and subscribe to our podcasts!____________________________Follow our RSA Conference USA 2024 coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageOn YouTube:
Is it possible to have Privacy in 2024? I ask Andy Yen (CEO of Proton) this and other very important questions about being anonymous and private on the Internet in 2024. // Books Mentioned // Extreme Privacy: What it takes to disappear by Michael Bazzell: https://amzn.to/3Hcz23m Linux Basics for Hackers by Occupy the Web: https://amzn.to/3RUC69d How to Hack like a Ghost by Sparc Flow: https://amzn.to/3NS8WWY If it's smart, it's vulnerable by Mikko Hypponen: https://amzn.to/4aGV2AK // Proton Affiliate LINKS // Proton Mail: https://go.getproton.me/SHs9 Proton VPN: https://go.getproton.me/SHsA // Andy's SOCIAL // X: https://twitter.com/andyyen Proton Blog: https://proton.me/blog/author/ayen LinkedIn: https://www.linkedin.com/in/andy-yen-... // David's SOCIAL // Discord: https://discord.com/invite/usKSyzb X / Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/@davidbombal // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 00:00 - Coming up 00:45 - Andy Yen, CEO of Proton // How Proton started 03:52 - Recommended books 04:31 - Is it possible to have privacy in 2024? 07:36 - Privacy vs Anonymity 09:39 - "Privacy is a human need" 10:41 - How to be more private 11:53 - Google's business model 13:45 - How to be more private (continued) 15:20 - How Apple uses your data 16:51 - The Proton and French activist case 20:52 - Proton Mail's encryption explained 23:14 - The Proton and French activist case (continued) 25:48 - The UK Online Safety Act explained 32:15 - How Proton's public keys work 36:51 - No logs on Proton VPN 38:41 - Switzerland and their privacy laws 40:25 - TOR vs VPN 43:32 - Proton's ecosystem 45:20 - Proton Pass and Proton Sentinel // Leaked passwords 52:42 - Basics on how to get privacy in 2024 57:02 - Advanced ways to get privacy 01:03:13 - Recommended messaging apps 01:06:19 - The worry of A.I. in 2024 01:07:58 - Why encryption in email is needed // SMTP (Simple Mail Transfer Protocol) explained 01:11:12 - Proton vs Google 01:13:28 - Conclusion vpn proton mail proton vpn proton tor proxy chains linux android iphone ios tails tails linux invisible online hide identity privacy kali linux online privacy internet security online privacy and security online privacy tips online privacy guide internet security tutorial Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #wifi #iphone #android
We're excited to welcome back to the podcast global security expert, speaker and author Mikko Hypponen who currently serves as Chief Research Officer at WithSecure. We dive into his book “If It's Smart, It's Vulnerable” and how cybersecurity has evolved and changed in the last year since it was published. He also shines a light on the ever-present topic of AI – the opportunity, risks, emerging regulations, deepfakes, geopolitical attack capabilities and so much more! And we talk about his road to cyber (more than 30 years!) and the spark of an article from 1983 on AI. Another great episode from Mikko you won't want to miss! Mikko Hypponen, Chief Research Officer, WithSecure Mikko Hypponen is a global security expert, speaker and author. He works as the Chief Research Officer at WithSecure and as the Principal Research Advisor at F-Secure. Mr. Hypponen has written on his research for the New York Times, Wired and Scientific American and he appears frequently on international TV. He has lectured at the universities of Stanford, Oxford and Cambridge. He was selected among the 50 most important people on the web by the PC World magazine and was included in the FP Global 100 Thinkers list. Mr. Hypponen sits in the advisory boards of t2 and Safeguard Cyber. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e258
Oggi vi consiglio un libro, in inglese, sulla storia di Internet, dei malware, dei virus e di tutto quello che è sicurezza dagli albori ad oggi, scritto da Mikko Hypponen, che dovreste conoscere, se avete una vaga idea di cosa sia la sicurezza informatica. Il libro in ebook o in cartaceo La serie Hacking Google su Youtube Pillole di Bit (https://www.pilloledib.it/) è un podcast indipendente realizzato da Francesco Tucci, se vuoi metterti con contatto con me puoi scegliere tra diverse piattaforme: - Telegram (o anche solo il canale dedicato solo ai commenti delle puntate) - TikTok (per ora è un esperimento) - Twitter - BlueSky - Il mio blog personale ilTucci.com - Il mio canale telegram personale Le Cose - Mastodon personale - Mastodon del podcast - la mail (se mi vuoi scrivere in modo diretto e vuoi avere più spazio per il tuo messaggio) Rispondo sempre Se questo podcast ti piace, puoi contribuire alla sue realizzazione! Con una donazione diretta: - Singola con Satispay - Singola o ricorrente con Paypal Usando i link sponsorizzati - Con un acquisto su Amazon (accedi a questo link e metti le cose che vuoi nel carrello) - Attivando uno dei servizi di Ehiweb - Iscrivendoti a FiscoZen, se hai la Partita IVA (prima consulenza gratuita e 50€ di sconto sul primo anno) Se hai donato più di 5€ ricordati di compilare il form per ricevere i gadget! Il sito è gentilmente hostato da ThirdEye (scrivete a domini AT thirdeye.it), un ottimo servizio che vi consiglio caldamente e il podcast è montato con gioia con PODucer, un software per Mac di Alex Raccuglia
This podcast is a commentary and does not contain any copyrighted material of the reference source. We strongly recommend accessing/buying the reference source at the same time. ■Reference Source https://www.ted.com/talks/mikko_hypponen_fighting_viruses_defending_the_net ■Post on this topic (You can get FREE learning materials!) https://englist.me/122-academic-words-reference-from-mikko-hypponen-fighting-viruses-defending-the-net-ted-talk/ ■Youtube Video https://youtu.be/Ixlv0DNxlk8 (All Words) https://youtu.be/mWfSZoh2IKw (Advanced Words) https://youtu.be/clJuEg-A3EA (Quick Look) ■Top Page for Further Materials https://englist.me/ ■SNS (Please follow!)
This podcast is a commentary and does not contain any copyrighted material of the reference source. We strongly recommend accessing/buying the reference source at the same time. ■Reference Source https://www.ted.com/talks/mikko_hypponen_three_types_of_online_attack ■Post on this topic (You can get FREE learning materials!) https://englist.me/62-academic-words-reference-from-mikko-hypponen-three-types-of-online-attack-ted-talk/ ■Youtube Video https://youtu.be/cVQzDdICY2Q (All Words) https://youtu.be/1I7ezIKyhzg (Advanced Words) https://youtu.be/VqJXSwn5G38 (Quick Look) ■Top Page for Further Materials https://englist.me/ ■SNS (Please follow!)
Our home IoT devices are constantly being probed for weaknesses so that they can be compromised and used for broader nefarious purposes like cyber warfare. The Ukrainians may be considered some of the best in the world when it comes to defending against cyber warfare because they have been regularly attacked and have been defending their systems for years. Today's guest is Mikko Hypponen. He has written for The New York Times, Wired, and Scientific American and has lectured at universities like Oxford, Stanford, and Cambridge. Mikko works as the Chief Research Officer for WithSecure and sits on the advisory board of Europol. Show Notes: [1:11] - Mikko shares his background as an old-school hacker. [2:46] - His mother advised Mikko to pursue this career in the 1980s. [5:23] - Smart devices like doorbells and refrigerators are not configured correctly because security makes the device more expensive. [7:50] - Mikko discusses regulation in Europe and how, most of the time, regulation fails. [9:03] - Many hackable devices wouldn't be hackable if consumers read the manual. [11:13] - Most malware traffic used to be Windows based but is now Linux based. [12:26] - Many people don't think that there's any data that can be stolen from IoT devices, but they are surprisingly powerful. [14:16] - Mikko explains some recent attacks. [15:43] - Medical devices are just as vulnerable as any other IoT device. [17:41] - What is a honeypot? [19:02] - Mikko shares that he has been a victim himself with his credit card number stolen twice. [20:14] - Even experts make mistakes. [21:26] - If you believe you have been hacked or think you are being scammed, take a step back. [23:06] - Mikko describes some of his experience living so near Russia and monitoring cyber warfare. [25:07] - Spying and espionage is a big problem in countries bordering Russia. [30:06] - With invasions in 2022, Ukraine improved many systems. [31:20] - Mikko makes a prediction on what will come next that sounds like Science Fiction, just like cyber war sounded like before. [32:18] - What are Mikko's thoughts on AI? Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Mikko.com
This podcast is a commentary and does not contain any copyrighted material of the reference source. We strongly recommend accessing/buying the reference source at the same time. ■Reference Source https://www.ted.com/talks/mikko_hypponen_how_the_nsa_betrayed_the_world_s_trust_time_to_act ■Post on this topic (You can get FREE learning materials!) https://englist.me/119-academic-words-reference-from-mikko-hypponen-how-the-nsa-betrayed-the-worlds-trust-time-to-act-ted-talk/ ■Youtube Video https://youtu.be/QzTCxjQXEKQ (All Words) https://youtu.be/VlBN5Sj7AFQ (Advanced Words) https://youtu.be/kmVzbkU-fPU (Quick Look) ■Top Page for Further Materials https://englist.me/ ■SNS (Please follow!)
Should you be using IoT devices? Think carefully ... there is a new Botnet out there targeting IoT devices. IoT devices unfortunately often have very poor security.... and can be targeted. // Juniper Free Training // Big thank you to Juniper Networks for supporting the community and making this training free (and sponsoring my channel). Go to https://juniper.net/davidbombal to get lots of training and also learn how to get certified for $50 (Associate Level). Use this voucher code to register for your courses: DAVIDBOMBAL If you have issues with the Juniper registration, please use these links that they gave me: For Login assistance link https://userregistration.juniper.net/... Customer Support link- https://support.juniper.net/support/r... // Occupy The Web SOCIAL // Twitter: https://twitter.com/three_cube // OTW Discount // Use the code BOMBAL to get a 20% discount off anything from OTW's website: https://davidbombal.wiki/otw Direct links to courses: Pro Subscriber: https://davidbombal.wiki/otwprosub 3 year deal: https://davidbombal.wiki/otw3year // Mr Robot Playlist // • Mr Robot // David's SOCIAL // Discord: https://discord.com/invite/usKSyzb Twitter: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: / davidbombal // Occupy The Web books // Linux Basics for Hackers: https://amzn.to/3JlAQXe Getting Started Becoming a Master Hacker: https://amzn.to/3qCQbvh Network Basics for hackers: https://amzn.to/3W1iiCQ Top Hacking Books you need to read: • Top Hacking Books for 2023 // Book Discussed // If it's smart it's vulnerable by Mikko Hypponen: https://amzn.to/3GdCbR0 // Other books // The Linux Command Line: https://amzn.to/3ihGP3j How Linux Works: https://amzn.to/3qeCHoY The Car Hacker's Handbook by Craig Smith: https://amzn.to/3pBESSM Hacking Connected Cars by Alissa Knight: https://amzn.to/3dDUZN8 // Louis Rossmann YouTube // Louis Rossmann: / @rossmanngroup // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 00:00 - Coming Up 01:40 - Sponsored Segment 03:17 - Welcome Back, OTW! 05:11 - OTW's New Course 06:42 - Hacking IoT 07:00 - Botnets and DDOS 14:03 - OpenWrt 18:34 - How do Botnets get Access? 21:57 - Electronic or Manual Locks? 26:28 - TikTok 30:24 - You Buy but You Don't Own 32:22 - Ring Doorbell Story 33:31 - Right to Repair 36:05 - Hacking Vehicles 40:44 - Luddites 47:00 - Conclusion iot mirai mirai botnet otw occupy the web internet of things hack hacking hacker cybersecurity Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #hacking #cybersecurity #iot
In this episode, Chris and Ron are joined by author, TED Talk presenter, and Chief Research Officer at WithSecure, Mikko Hyppönen, to discuss the past, present, and future of cybersecurity. With over 30 years of experience in cybersecurity, Mikko shares his insights on everything from the importance of knowing and understanding the enemy to the security implications of smart devices. Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals NetSPI has a team of skilled pen-testers that can help you find those critical vulnerabilities and become your partner in creating the right remediation game plan for you. Check them out at http://netspi.com/HVM ........................... Links: Connect with our guest Mikko Hyppönen on LinkedIn Check out Mikko's book If It's Smart, It's Vulnerable Join our Patreon monthly creative mastermind Connect with Ron Eddings on LinkedIn and Twitter Connect with Chris Cochran on LinkedIn and Twitter Purchase an HVS t-shirt at our shop Continue the conversation by joining our Discord Check out Hacker Valley Media and Hacker Valley Studio
Trong sách nói Nghệ Thuật Ẩn Mình, Kevin Mitnick - hacker nổi tiếng nhất thế giới, sẽ hướng dẫn thính giả các biện pháp dễ thực hiện (và ít tốn kém) giúp bạn – trên cương vị một cá nhân bình thường và một người tiêu dùng – có thể giấu các thông tin nhận dạng cá nhân của mình trong kỷ nguyên của Dữ liệu Lớn, vốn không thiếu những scandal quy mô quốc tế về những vụ vi phạm dữ liệu người dùng thường xuyên xuất hiện trên các mặt báo. Mitnick bàn đến nhiều phương tiện mà chúng ta sử dụng hằng ngày – từ điện thoại, email, cho đến tin nhắn,… – chỉ ra những lỗ hổng mà người khác có thể lợi dụng để giành quyền kiểm soát các dữ liệu của chúng ta, đồng thời đưa ra những giải pháp phòng chống cụ thể và hữu hiệu mà bất kỳ ai cũng có thể thực hiện để tự bảo vệ mình.Nhưng có lẽ một trong những giá trị quan trọng nhất của sách nói là qua đó, tác giả đã hóa giải niềm tin thơ ngây của đại đa số chúng ta rằng những hoạt động của mình trên mạng là đàng hoàng và lành mạnh nên có thể công khai, rằng chỉ những người có ý đồ xấu mới phải tìm cách che giấu các dữ liệu cá nhân. Hay nói như Mikko Hypponen, nhà nghiên cứu trưởng của hãng bảo mật F-Secure, thì: “Có thể bạn không có gì phải giấu diếm. Nhưng bạn có rất nhiều thứ phải bảo vệ đấy.”--Về Fonos:Fonos là ứng dụng sách nói có bản quyền. Trên ứng dụng Fonos, bạn có thể nghe định dạng sách nói của những cuốn sách nổi tiếng nhất từ các tác giả trong nước và quốc tế. Ngoài ra, bạn được sử dụng miễn phí nội dung Premium khi đăng ký trở thành Hội viên của Fonos: Tóm tắt sách, Ebook, Thiền định, Truyện ngủ, Nhạc chủ đề, Sách nói miễn phí cho Hội viên.--Tải ứng dụng Fonos tại: https://fonos.app.link/tai-fonosTìm hiểu về Fonos: https://fonos.vn/Theo dõi Facebook Fonos: https://www.facebook.com/fonosvietnam/Theo dõi Instagram Fonos: https://www.instagram.com/fonosvietnam/Đọc các bài viết thú vị về sách, tác giả sách, những thông tin hữu ích để phát triển bản thân: http://blog.fonos.vn/
Mikko Hypponen is a global cyber security expert with over thirty years of experience working as a researcher and investigator. He is a sought-after lecturer, and he was profiled in Vanity Fair. His TED Talk has been viewed more than 2 million times. He can be reached on his website @ https://mikko.com/ and https://www.ifitssmartitsvulnerable.com/ and get social with Mikko on Twitter @mikko. --- Send in a voice message: https://anchor.fm/techandmain/message
Mikko Hypponen, bestselling author of If It's Smart, It's Vulnerable, joins us this week to talk about the Hypponen Law, the future of the internet, the worrying trend that he foresees in the future with respect to cybercriminal gangs, and how he thinks we can best combat the new developments when they come to fruition. He also laments the loss of privacy in the internet age and gives us a few tips to secure our environments and regain some of our privacy. Learn about:
Mikko Hypponen is the CRO of WithSecure and a principal research Officer at F-Secure. In this interview with our host, Jordy Monn, he discusses the eventful and rocky early start of his software engineering career, hybrid warfare, reverse engineering, recent exploits like Log for Shell and heart bleed and more. This episode is packed with The post The Cyber Frontier with Mikko Hypponen appeared first on Software Engineering Daily.
Mikko Hypponen is the CRO of WithSecure and a principal research Officer at F-Secure. In this interview with our host, Jordi Mon, he discusses the eventful and rocky early start of his software engineering career, hybrid warfare, reverse engineering, recent exploits like Log for Shell and heart bleed, and more. This episode is packed with The post The Cyber Frontier with Mikko Hypponen appeared first on Software Engineering Daily.
Join our Discord server: https://discord.gg/7QsrTbKchc Today's article: https://www.reddit.com/r/IAmA/comments/wz7uoy/i_am_mikko_hypponen_a_global_infosec_expert_ask/ Follow @PrivSecNews on Twitter Hosts: Peter Lowe (@pgl) Jon Cohen (@jonnisec) Mike Sutton (@zenmike)
Podcast: Unsolicited Response Podcast (LS 33 · TOP 5% what is this?)Episode: Mikko Hypponen: If It's Smart, It's VulnerablePub date: 2022-08-10Dale Peterson talks with Mikko Hypponen about his new book: If It's Smart, It's Vulnerable. As with all books, Dale asks who Mikko wrote the book for, who is the intended reader. Then they dig into some of the interesting parts for the security professional including: What security tasks should we expect users to do (and why security training fails) Whose responsible for IoT/IIoT cybersecurity? How are we going to succeed in security IoT, and what regulation might work? Hypponen's Law: If It's Smart, It's Vulnerable Cyber Deterrence Why have their been so few cyber attacks on critical infrastructure? and more. Links If It's Smart, It's Vulnerable book S4x23 Call For Presentations The podcast and artwork embedded on this page are from Dale Peterson: ICS Security Catalyst and S4 Conference Chair, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
It's Hacker Summer Camp time! Thank you for joining this live stream during Black Hat and DEF CON with guest Mikko Hypponen!Watch the live stream video on our Black Hat and DEF CON coverage page: https://www.itspm.ag/bhdc22Follow our social media as everything will be streamed live as it is. No editing, no script, and most of all … no BS
Dale Peterson talks with Mikko Hypponen about his new book: If It's Smart, It's Vulnerable. As with all books, Dale asks who Mikko wrote the book for, who is the intended reader. Then they dig into some of the interesting parts for the security professional including: What security tasks should we expect users to do (and why security training fails) Whose responsible for IoT/IIoT cybersecurity? How are we going to succeed in security IoT, and what regulation might work? Hypponen's Law: If It's Smart, It's Vulnerable Cyber Deterrence Why have their been so few cyber attacks on critical infrastructure? and more. Links If It's Smart, It's Vulnerable book S4x23 Call For Presentations
It's Hacker Summer Camp time! Thank you for joining this live stream during Black Hat and DEF CON with guest Mikko Hypponen!Watch the live stream video on our Black Hat and DEF CON coverage page: https://www.itspm.ag/bhdc22Follow our social media as everything will be streamed live as it is. No editing, no script, and most of all … no BS
Mikko Hyppönen is one of the world's most renowned cyber security experts and has investigated cybercrime for over 25 years. From the days of naughty, nuisance, but ultimately harmless viruses to the very serious cyber threats society faces today, he's seen it all. In addition to his many accomplishments, he is also an author, and he dropped in to discuss the English-language release of his book "If It's Smart, It's Vulnerable".
There's an online war in Ukraine, one that you haven't heard much about because that country is holding its own with an army of infosec volunteers worldwide. Mikko Hypponen joins The Hacker Mind to discuss cybercrime unicorns, the fog of cyber war that surrounds the Ukrainian war with its much larger neighbor, and of course Mikko's new book, If It's Smart, It's Vulnerable.
The Digital Supply Chain is broken and getting challenging to fix. In this "What to LookOut for in 2022" series - we interviewed experts at RSA and BSidesSF on the Broken Digital Supply Chain and ways in which we can fix it. Watch the video for this episode on You Tube - Fix the Broken Digital Supply Chain Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cloudsecuritypodcast.tv Host Twitter + Linkedin: Ashish Rajan (@hashishrajan) + Shilpi Bhattacharjee (@shilpibhattacharjee) Guests Linkedin: Thank you to Mikko Hypponen, Shamla Naidoo, Clint Gibler, Ryan F, Mike Ruth, Paul Calatayud, Shay Levi, Dylan Ayrey, Aaron Brown, Mackenzie Jackson & Dan Gordon for participating in this episode. Podcast Twitter - @CloudSecPod @CloudSecureNews If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels: - Cloud Security News - Cloud Security Academy
Joining the podcast this week is Mikko Hypponen, Chief Research Officer at WithSecure. He breaks down the rise and fall of cybercrime unicorns, the effectiveness of unicorn hunting season and bounties, the impact of nations fighting back in today's cyber war, Ukraine's preparedness for Russian cyber war, cryptocurrencies future and how he came up with Hypponen's Law. And be sure to keep an eye out for his upcoming book from Wiley later this summer, “If It's Smart, It's Vulnerable”! Mikko Hypponen, Chief Research Officer, WithSecure Mikko Hypponen is a global security expert. He has worked at F-Secure, now WithSecure, since 1991. Mr. Hypponen has written on his research for the New York Times, Wired and Scientific American and he appears frequently on international TV. He has lectured at the universities of Stanford, Oxford and Cambridge. He was selected among the 50 most important people on the web by the PC World magazine and was included in the FP Global 100 Thinkers list. Mr. Hypponen sits in the advisory boards of t2 and Social Safeguard. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e185
Find out what is new in the world of cybersecurity in this CTO podcast featuring cybersecurity expert Mikko Hypponen, the originator of Hypponen's Law (if it's smart
Hey listeners—we've got something different for you to try. If you enjoyed our Caturday episode and want more stories about security, we think you'll like Season 9 of Command Line Heroes. It's Red Hat's tech history show, and this new season is all about malware. Here's the first episode:Computer viruses and worms haunt the internet. They worm their way into a system, replicate, and spread again. It's a simple process—with devastating consequences. But there's a whole industry of people that rose up to fight back. Craig Schmugar recalls how he and his team responded to MyDoom, one of the fastest-spreading worms ever. Dr. Nur Zincir-Heywood reveals the inner workings of viruses and worms, and how they draw their names from the world of biology. And security expert Mikko Hypponen shares advice on avoiding malware. But he also warns that we're in an arms race against malware developers.
Computer viruses and worms haunt the internet. They worm their way into a system, replicate, and spread again. It's a simple process—with devastating consequences. But there's a whole industry of people that rose up to fight back. Craig Schmugar recalls how he and his team responded to MyDoom, one of the fastest-spreading worms ever. Dr. Nur Zincir-Heywood reveals the inner workings of viruses and worms, and how they draw their names from the world of biology. And security expert Mikko Hypponen shares advice on avoiding malware. But he also warns that we're in an arms race against malware developers.If you want to read up on some of our research on viruses and worms, you can check out all our bonus material over at redhat.com/commandlineheroes. Follow along with the episode transcript.
Mikko Hypponen talks about how to protect your company against security threats, why ransomware is so common, the future of cyberwars and why you should trust the cloud. He also reveals how he crashed his customer's brand new car. See the episode notes and transcript: https://www.talkswithpetri.com/if-its-smart-its-vulnerable/. Guest bio Mikko Hypponen is a global security expert. He has worked at F-Secure since 1991. Mr. Hypponen has written on his research for the New York Times, Wired and Scientific American and he appears frequently on international TV. He has lectured at the universities of Stanford, Oxford and Cambridge. He was selected among the 50 most important people on the web by the PC World magazine and was included in the FP Global 100 Thinkers list. -------------- All episode notes and transcripts: http://www.talkswithpetri.com/ Subscribe: Apple iTunes (Podcasts), Google Podcasts, Spotify. Follow on Twitter. If you like the podcast please leave a short review on Apple Podcasts (iTunes) or get Petri a coffee. You can also send suggestions.
Mikko Hypponen is a well known security and privacy expert and the chief research officer at F-Secure Corporation. He has led his team through some of the largest computer virus outbreaks in history including the Sobig.F worm, the Sasser outbreak, and he has even participated in classified briefings on the Stuxnet worm. F-Secure is a global cyber security and privacy company with over 30 offices around the world and a presence in more than 100 countries, with Security Lab operations in Helsinki and in Kuala Lumpur, Malaysia. Scott Schober is a #cybersecurity and wireless technology expert, author of Hacked Again and Cybersecurity is Everybody's Business, host of 2 Minute CyberSecurity Briefing video podcast and CEO of Berkeley Varitronics Systems who appears regularly on Bloomberg TV, Fox Business & Fox News, CGTN America, Canadian TV News, as well as CNN, CBS Morning Show, MSNBC, CNBC, The Blaze, WPIX as well as local and syndicated Radio including Sirius/XM & Bloomberg Radio and NPR.
Mikko Hypponen is a well known security and privacy expert and the chief research officer at F-Secure Corporation. He has led his team through some of the largest computer virus outbreaks in history including the Sobig.F worm, the Sasser outbreak, and he has even participated in classified briefings on the Stuxnet worm. F-Secure is a global cyber security and privacy company with over 30 offices around the world and a presence in more than 100 countries, with Security Lab operations in Helsinki and in Kuala Lumpur, Malaysia. Scott Schober is a #cybersecurity and wireless technology expert, author of Hacked Again and Cybersecurity is Everybody's Business, host of 2 Minute CyberSecurity Briefing video podcast and CEO of Berkeley Varitronics Systems who appears regularly on Bloomberg TV, Fox Business & Fox News, CGTN America, Canadian TV News, as well as CNN, CBS Morning Show, MSNBC, CNBC, The Blaze, WPIX as well as local and syndicated Radio including Sirius/XM & Bloomberg Radio and NPR.
Z Facebook wyciekły dane ponad 500 MLN użytkowników! Brzmi strasznie, ale co to naprawdę znaczy? Czy powinieneś się tym przejmować? Dlaczego tak się dzieje i jakie są zagrożenia? Brzmi strasznie, ale podejdźmy do tego metodycznie - w tym odcinki w sposób przystępny sposób odpowiadam na kilka pytań:1. Jakie dane wyciekły i co to znaczy dla Ciebie 2. Dlaczego takie wycieki się zdarzają i jak podejść do tego aby ich wpływ na CIebie był jak najmniejszy3. Dlaczego ja przestałem korzystać z tych serwisów i dlaczego nie umieszczam tam już od dawna żadnych danych osobistych 4. Jakie trendy w przyszłości pozwolą nam zabezpieczyć swoje dane w lepszy sposób. BONUS: są też pierwsze pytania od słuchaczy!! Pamiętaj, jeżeli masz jakieś pytanie, nagraj je i wyślij na podcast@onyszko.com. Możesz też wysłać je jako e-mail, ale fajnie by było gdybyś je nagrał(a) i stał się częścią tego podcastu. Linki do źródeł, osób, miejsc i książek wymienionych w odcinku: Informacja o wycieku na serwisie Niebezpiecznik - https://niebezpiecznik.pl/post/facebook-wyciek-dane-533-milionow-uzytkownikow/Serwis Have I been Pwned - sprawdź czy Twoje dane wyciekły: https://haveibeenpwned.com/Blog Troy'a Hunta: https://www.troyhunt.com/Digital Minimalism - removing myself (yourself) from social media game: https://www.onyszko.com/digital-minimalism/Mikko Hypponen, The Internet is on fire | TEDxBrussels: https://www.youtube.com/watch?v=QKe-aO44R7kBitClout: https://bitclout.com/Tutaj znajdziesz mnie na BitClout: https://bitclout.com/u/tonyszkoIdentity Foundation: https://identity.foundation/Microsoft Verifable Credentials: https://www.microsoft.com/en-us/security/business/identity-access-management/verifiable-credentialsDecentralized Identifiers (DIDs) v1.0: https://www.w3.org/TR/did-core/DIF Identity Hubs: https://github.com/decentralized-identity/identity-hub/blob/master/explainer.mdEncrypted Data Vaults: https://github.com/digitalbazaar/encrypted-data-vaults/blob/master/draft-documents/encrypted-data-vaults.mdPrzykład użycia Verifable Credentials - Daniel Krzyczkowski (MVP): https://daniel-krzyczkowski.github.io/Azure-AD-Verifiable-Credentials-Intro/Full disclouser - pracujemy razem z Danielem w Predica w zespole Technical Fellows. Signal - bezpieczny komunikator: https://signal.org/en/Pozostańmy w kontakcie >> Zapisz się do mojego newsletter (EN)
We face cyber threats from state-sponsored hackers, hackers for hire, global cyber syndicates, and terrorists. They seek our state secrets, our trade secrets, our technology, and our ideas - things of incredible value to all of us. They seek to strike our critical infrastructure and to harm our economy. -- James Comey I'm a hacker, but I'm the good kind of hackers. And I've never been a criminal. -- Mikko Hypponen What happens on InSecurity when Matt Stephenson sits down with Rob Willis, a top-flight ethical hacker, red-teamer and all around cybersecurity expert to talk about… comic books? You get a brand new comic universe created by hackers for hackers that it rooted in actual technology and hacking. The Paraneon Universe is as much cyber-fact as it is science fiction. When you get bored with the same capes, cowls and armor… come check out what the real future is going to look like in Paraneon… where you can’t punch your way out of everything. About Rob Willis Rob Willis (@rej_ex)’s entire life has been centered around comic books and tech. If he wasn't a cybersecurity professional, there is zero doubt that he would be working in comics full-time. To date Rob has self-funded the creation of these titles and other Paraneon assets and will continue to create and expand the Universe with exciting characters and storylines pressure. By day he is an InfoSec professional. Rob runs consulting at 1337 Inc among other things. He is a Red team, Blue team, and purple team professional. He isnt just breaking into things for clients, he’s also building and running security programs. He is also a part of the hacking collective Sakura Samurai. You may not know them yet, but you’ve likely read about their work already. Rob is featured in the popular Tribe of Hackers series from Wiley. He has appeared in the original Tribe of Hackers and new book Tribe of Hackers: Blue Team. In a Previous life, Rob was a Researcher at the Breach and Attack Simulation Pioneer ThreatCare. He has worked places he can’t disclose, but which I have personally verified… It’s legitimate, as crazy as that sounds. His most mind numbing accomplishments cannot be talked about publicly, but if you become his friend he will likely show you some insane stuff -- as long as it doesnt compromise national security. About Paraneon Paraneon (@paraneonU) develops and publishes stories from a cyberpunk future. For hackers, by hackers. The Paraneon Universe is comprised of technocentric cities, underground worker colonies, and apocalyptic 'drylands'. All factories and production has been moved to Mars due to pollution, and there's more Androids on Mars than Humans. The Hive Network The Hive is a massive incubator-like structure that humans are placed inside of while their minds integrate with a virtual reality world. Joining the Hive is voluntary, and requires each member to purchase their spot within it. Those in the Hive decided to be added to it, to ‘retire’ after working many years as a lower-class member of society, where most of their time was spent training — then working — in a specialized trade associated with the underground worker colony they were born into. The world is advanced with technocentric cities, but living in a city requires decades of saving for a colony member who hopes to purchase citizenship in one. The class system dictates the resources and quality of life more than any period throughout history, and aside from the tribal peoples of the desolate drylands, colony members are the lowest part of society. Why would someone choose to be a member of the Hive? It’s not a hard decision for someone to live the remainder of their life in a world where they can have and be whatever they choose. It may not be real, but over time it becomes difficult to imagine virtual reality as anything but reality. For this reason many refer to the Hive as the ‘great equalizer’, convinced that their lives in reality are nothing but a painful stepping stone on the path to their digital salvation. Portals Portals takes place in the drylands. The 'drylanders' do not take kindly to tech or strangers. The first story arc introduces an undercover police officer from one of the cities who enters the drylands in an attempt to blend in, all while searching for 'dangerous' fugitives. Neon Skyline Sudo is a talented hacker who is placed in a research program surrounding bio-hacking on Mars. He uncovers a massive conspiracy when accidentally finding that many androids, billed as 'next-gen AI' are actually cyborgs, implanted with human brain tissue. Can he sound the alarm and 'free' the cyborgs before he gets killed? About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Broadcast Media team at BlackBerry, which puts me in front of crowds, cameras, and microphones all over the world. I am the regular host of the InSecurity podcast and video series at events around the globe. I have spent the last 10 years in the world of Data Protection and Cybersecurity. Since 2016, I have been with Cylance (now BlackBerry) extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to network security, can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty they weren't there for us, but you never know... Every week on the InSecurity Podcast, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy. InSecurity is about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round... Can’t get enough of Insecurity? You can find us at Spotify, Apple, Amazon Music & Audible as well as ThreatVector, GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
We thought locking up data and demanding a ransom to decrypt it was bad. But ransomware criminals have stooped even lower and now, threats of public data exposure on top of multimillion-dollar ransoms are routine tactics. What's next? Where's ransomware going in 2021? Joining us to give his take is F-Secure's chief research officer and CISO MAG's Cybersecurity Person of the Year 2020, Mikko Hypponen. Also in this episode: Ransomware's evolution, why it's mainly a Windows problem, the impact of remote work, how ransomware's industrialization affects the threat landscape, and more. Links: Episode 49 transcript
Dare to Suck - Inspiring changemakers opening up to young adults (and their parents)
Not one week passes without news of data breaches and confidential client data leaking. A lot of responsibility is left with the sole user, which makes groups like children, elderly people and language minorities especially vulnerable and exposed. This is why we decided to speak to Helinä Turunen who is an Information Security Specialist at The National Cyber Security Centre. She paints a reassuring picture that a lot is already done to keep citizens safe but there are also areas, which we should be vigilant about.The Top 5 key takeaways from her story:Myth busted: cybersecurity superheroes do not have to be excellent programmers. There you have it!Overarching mantra: have a strong enough password, preferably store it in a password manager with a strong master password, make sure you have all your devices updated to the latest operating system or security standards, and ensure that you don´t share private information (name, home location, social security number, etc.) as hackers can build a profile of you.Reduce the number of applications, the number of devices, and the number of access points you connect to. It will increase your level of safety and decrease the possibility of being a target for cybercriminalsCheck out https://www.youtube.com/watch?v=7ZtVsEsqjNs and see for yourself how Team Whack is hacking the site of a social media influencer without her knowing about it. Bottom line: you will never know when your security has been compromised.Many countries in Europe have cybersecurity strategies and cybercrime units, which try to protect their citizens.Individuals and/or organizations can share suspicious information without having to fear exposure.Ways to connect:https://www.linkedin.com/in/hturunen/, Twitter: HelinaTAccounts to follow:Mikko Hypponen, F-Secure (https://www.linkedin.com/in/hypponen/)
Poker is a competitive game. Unlike other casino games, poker is player vs player. Criminal hackers have understood this for a while and sometimes hack the other players to get an edge. And that small edge can result in millions of dollars in winnings. This episode contains a story from Mikko Hypponen of F-Secure. We also interview Mikko to know more about him and the history of malware. Sponsors This episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25. This episode was sponsored by Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools. Sources https://www.cardplayer.com/poker-news/18318-wsop-bracelet-winner-jailed-for-web-poker-cheating https://forumserver.twoplustwo.com/29/news-views-gossip/my-unbelievable-ept-barcelona-story-hotel-rooms-arts-barcelona-broken-into-plant-trojans-1369171/ Mikko’s research on bypassing hotel room keys https://archive.f-secure.com/weblog/archives/00002647.html https://pokerfuse.com/news/live-and-online/more-stories-of-tampered-laptops-emerge-in-wake-of-ept-barcelona-scam-24-09/ https://forumserver.twoplustwo.com/showpost.php?p=40050535&postcount=410 https://forumserver.twoplustwo.com/showpost.php?p=40099537&postcount=794 https://igaming.org/poker/news/danish-former-high-stakes-pro-reported-to-police-for-massive-fraud-1602/ https://nyheder.tv2.dk/krimi/2019-12-02-dansk-pokerspiller-far-konfiskeret-26-millioner-kroner https://www.flushdraw.net/news/peter-jepsen-verdict-a-mixed-victory-for-poker-justice/ https://www.bankrollmob.com/poker-news/2019123/danish-poker-pro-sentenced-jail-cheating-others-online-poker Video: Peter Jepsen talks about an attempted hack on him https://www.sijoitustieto.fi/comment/29593#comment-29593 https://forumserver.twoplustwo.com/29/news-views-gossip/sad-conclusion-my-barcelona-incident-1397551/ Video: Brain Searching for the first PC virus in Pakistan https://archive.org/details/malwaremuseum
Mikko Hypponen, chief research officer at F-Secure, tells Tonya Hall what counterfeit IT is, the problem it presents, and how checking serial numbers can help. FOLLOW US - Subscribe to ZDNet on YouTube: http://bit.ly/2HzQmyf - Watch more ZDNet videos: http://zd.net/2Hzw9Zy - Follow ZDNet on Twitter: https://twitter.com/ZDNet - Follow ZDNet on Facebook: https://www.facebook.com/ZDNet - Follow ZDNet on Instagram: https://www.instagram.com/ZDNet_CBSi - Follow ZDNet on LinkedIn: https://www.linkedin.com/company/zdnet-com/ - Follow ZDNet on Snapchat: https://www.snapchat.com/add/zdnet_cbsi Learn more about your ad choices. Visit megaphone.fm/adchoices
Tonya Hall sits down with Mikko Hypponen, chief research officer at F-Secure, to talk about how ransomware is evolving and how cloud storage is becoming a growing risk. FOLLOW US - Subscribe to ZDNet on YouTube: http://bit.ly/2HzQmyf - Watch more ZDNet videos: http://zd.net/2Hzw9Zy - Follow ZDNet on Twitter: https://twitter.com/ZDNet - Follow ZDNet on Facebook: https://www.facebook.com/ZDNet - Follow ZDNet on Instagram: https://www.instagram.com/ZDNet_CBSi - Follow ZDNet on LinkedIn: https://www.linkedin.com/company/zdnet-com/ - Follow ZDNet on Snapchat: https://www.snapchat.com/add/zdnet_cbsi Learn more about your ad choices. Visit megaphone.fm/adchoices
It's the topic on everyone's minds: The new state of our world amid and after a global pandemic. Mikko Hypponen, F-Secure's Chief Research Officer, joins Janne to discuss a host of COVID-19-related security topics. In this episode: Avoiding Zoom bombers, new concerns for IT environments, COVID-19 hoaxes and spam, ransomware and hospitals, APT activity, privacy concerns of coronavirus tracking apps, and how the infosec community can help. Links: Episode 38 transcript Webinar: Mikko Hypponen - Cyber Security and COVID-19
Welcome to podcast 343 of the technology podcast series. This podcast is covid-19 based with a webinar done by Mikko Hypponen to a conspiracy theory which we'll play the audio and comments from Michael in Tennessee. To boot, a video about 10 minutes dealing with 5G and the prospects of whether it actually gets you sick. The podcast is a little over an hour, and I hope you enjoy it! Thanks so much for listening.
Should governments responde to cyber attack with deadly force? Senior researcher Mikko Hypponen and Prof. Itzik Ben Israel (Ret. General, IDF R&D) discuss this sensative question.Advertising Inquiries: https://redcircle.com/brands
Mikko Hypponen, RMISC keynote speaker and Chief Research Officer at F-Secure is our feature interview this week. News from John Hickenlooper, In-N-Out, Southwest Airlines, Techstars, ULA, Ping Identity, root9B, Optiv, Webroot, ManagedMethods and a lot more! Hickenlooper for… Senate? Hick drops out of one race, and maybe into another. In-N-Out Burger proposes a location for restaurant #1, Southwest wants to bring an additional 100 daily flights to Denver, Techstars raises a lot of money, ULA’s Dream comes true, Ping hires a new CMO, root9B hires a new head of sales, Optiv has a short list of ways to avoid phishing, Webroot has advice for your security internship, ManagedMethods talks DLP. Support us on Patreon! Fun swag available - all proceeds will directly support the Colorado = Security infrastructure. Come join us on the new Colorado = Security Slack channel to meet old and new friends. Sign up for our mailing list on the main site to receive weekly updates - https://www.colorado-security.com/. If you have any questions or comments, or any organizations or events we should highlight, contact Alex and Robb at info@colorado-security.com This week’s news: Join the Colorado = Security Slack channel John Hickenlooper ends 2020 presidential campaign, nods at potential Senate bid In-N-Out Burger submits proposal for location near Park Meadows Mall Southwest Airlines exec said carrier could add more than 100 flights a day in Denver if its gets gate wish Form D Friday: Boulder-based startup accelerator Techstars raising nearly $42.5M ULA contracted to fly SNC's Dream Chaser for NASA missions to ISS Ping Identity Names Kevin Sellers as Chief Marketing Officer R9B Expands Executive Team – R9B 22 ways to protect yourself against phishing attacks | Optiv Webroot - Will You Ace Your Cybersecurity Internship? How Data Loss Prevention Software Works | ManagedMethods Job Openings: Ping Identity - Manager of Product Security Ping Identity - GRC Analyst Untangle - Director, Software Engineering - Cybersecurity IT Security Operations Manager - Platform.sh Arrow Electronics - Cloud Security Senior Risk Analyst Bank Of America - Malware Threat Sr. Specialist Bank Of America - Data Security Analytics Associate Direct Defense - Security Analyst Zivaro - Cybersecurity Director Upcoming Events: This Week and Next: C.Springs ISSA - August Meetings - 8/20-21 CTA - DevOps at Scale - 8/21 IT Security Professionals Happy Hour hosted by Intelisecure - 8/22 CTA - Women in Government with CWCC Young Professionals Board and Public Affairs Committee - 8/22 C.Springs - Air Force CyberWorx Small Business Innovation Research Seminar - 8/22 Elastic Denver User Group - Open Source Network Security Monitoring using Zeek & Elastic - 8/22 SecureSet - Beginner’s Intro to Capture The Flag - 8/23 CTA - SECRETS TO SUCCESS IN THE NEW WORLD OF INNOVATION: A CONVERSATION WITH GARY SHAPIRO - 8/23 CISSP Seminar Series Domain 3 (Security Engineering) - 8/24 Elastic Denver Users Group - Hands-on Workshop: Threat Hunting and Incident Response using Zeek and Elastic - 8/24 Colorado Springs ISSA - Mini Seminar - 8/24 GDPR Meetup - Ping Pong and Food - 8/27 EmergingTechFan - AI is a Team Sport - 8/27 ISC2 Pikes Peak - August Chapter Meeting - 8/28 CSA - August 2019 - CSA Rockies Game - 8/29 Other Notable Upcoming Events SecureWorld 2019 - 10/29-30 View our events page for a full list of upcoming events * Thanks to CJ Adams for our intro and exit! If you need any voiceover work, you can contact him here at carrrladams@gmail.com. Check out his other voice work here. * Intro and exit song: "The Language of Blame" by The Agrarians is licensed under CC BY 2.0
Tonya Hall catches up with Mikko Hypponen, chief research officer at F-Secure, to discuss the latest from Def Con and Black Hat 2019 and to talk about why Hypponen says that, right now, enterprise security is stronger than ever. Follow ZDNet: Watch more ZDNet videos: http://zd.net/2Hzw9Zy Subscribe to ZDNet on YouTube: http://bit.ly/2HzQmyf Follow ZDNet on Twitter: https://twitter.com/ZDNet Follow ZDNet on Facebook: https://www.facebook.com/ZDNet Follow ZDNet on Instagram: https://www.instagram.com/ZDNet_CBSi Follow ZDNet on LinkedIn: https://www.linkedin.com/company/zdnet-com/ Follow ZDNet on Snapchat: https://www.snapchat.com/add/zdnet_cbsi Learn more about your ad choices. Visit megaphone.fm/adchoices
Cyber war is a term we often hear tossed about, but is it just science fiction, or is it really happening? How worried should we be about the potential governmental offensive use of cyber power, and what constitutes a cyber weapon? Mikko Hypponen, Chief Research Officer of F-Secure, joins us this episode to discuss governmental APT actors, why words matter when it comes to cyber war, and why cyber weapons are the perfect weapons. Links: Episode 20 transcript
What does it take to be CyberAware? What can we learn from the cybercriminals? What can we learn from each other? Everyone has a success story and everyone has a failure; how can we leverage these to extract a valuable learning lesson? Sean Martin chats with Jenny Radcliffe and Mikko Hypponen to hear what they’ve learned as they’ve engaged with users, companies, countries, and law enforcement from around the world. To kick things off, Sean chats with Jenny Radcliffe. While Jenny gets to do some fantastic work in the social engineering world, she also hosts a successful podcast series, The People Hacker, which connects her with some of the top information security professionals from around the world. During their chat, one of the more poignant points that Jenny makes is that there isn’t a one-size-fits-all answer to how people and companies should approach cybersecurity and privacy. After chatting with Jenny, Sean connected with Mikko who just got off stage telling stories of cyber fraud and hacking — two different things, by the way — while sharing pictures of the tracksuit hackers: Charlie Miller and Chris Valasek. Mikko takes a clear view for cybersecurity in that it needs to be a permanent topic at the top management level of every leadership team and every board, regardless of company size. The reasoning behind this view is evident as Mikko tells some real stories about cybercrime and fraud - even attempts made at his own company. This episode of At The Edge is brought to you by Edgescan. Visit Edgescan on ITSPmagazine at https://www.itspmagazine.com/company-directory/edgescan
This episode of Tomorrow’s Capital focuses on the digitalization of crime, including the evolution and future of cybercrime as well as cybercrime trends specifically related to cryptocurriencies and blockchain-based financial instruments. Mikko Hypponen also discusses cyber criminals’ use of AI for attack purposes, and the complexity of implementing security regulations.
This week, Adrian Weckler talks to the global IT security celebrity and virus hunter Mikko Hypponen. Hypponen, chief research officer at F-Secure, says that we should be taking threats from North Korea a lot more seriously than we do. He also explains why, in the hierarchy of worst malware outbreaks in recent years, Petya was probably worse than Wannacry. And he hears how Adrian is guilty of perpetuating one of the stupidest security practices in Ireland today. (Hypponen is one of the keynote speakers at this year's Dublin Information Sec 2018, taking place in the RDS on October 15th.)
Mikko Hypponen is a global security expert. He has worked at F-Secure since 1991. He has written on his research for the New York Times, Wired and Scientific American and he appears frequently on international TV. He has lectured at the universities of Stanford, Oxford and Cambridge. He was selected among the 50 most important people on the web by the PC World magazine and was included in the FP Global 100 Thinkers list. Mikko is a member of the board of the Nordic Business Forum. He sits in the advisory boards of t2, Social Safeguard and Hoxhunt, and in the advisory panel for the Monetary Authority of Singapore.
The recent allegations against Russian antivirus vendor Kaspersky have prompted wider questions about antivirus in general - how it operates and what sort of data it collects from customer machines. In the first episode of Cyber Security Sauna, F-Secure's chief research officer Mikko Hypponen joins host Janne Kauhanen to answer these questions. You'll also hear his thoughts on Kaspersky and why it's important to trust your vendor. Links: Episode 1 blog post Episode 1 transcript FAQ: Everything You Wanted to Know About AV Data Transmission But Were Afraid to Ask F-Secure Data Transfer Declaration
Welcome to another episode of STP Radio. Today, Smita Mishra talks with our opening keynote speaker, Mikko Hypponen - Chief Research Officer at F-Secure. Smita and Mikko chat about his Keynote address; State of the Net at the upcoming STPCon in Dallas - September 19-22. Find out how people believe that security and privacy are so important, yet seem to care little about their personal information being sold and used across the web. Mikko provides examples how F-Secure has tested this across the world wide web.Learn More: http://www.stpcon.com/sessions/keynote-state-of-the-net/
Welcome to another episode of STP Radio. Today, Smita Mishra talks with our opening keynote speaker, Mikko Hypponen - Chief Research Officer at F-Secure. Smita and Mikko chat about his Keynote address; State of the Net at the upcoming STPCon in Dallas - September 19-22. Find out how people believe that security and privacy are so important, yet seem to care little about their personal information being sold and used across the web. Mikko provides examples how F-Secure has tested this across the world wide web.Learn More: http://www.stpcon.com/sessions/keynote-state-of-the-net/
Listen to Chief Research Officer, F-Secure, Mikko Hypponen's keynote on Profiling the Connected Cybercriminal from #infosec16
In this edition, Brian and Gordon discuss the latest in cybersecurity news, including the Panama Papers, and Gordon talks to Mikko Hypponen, a giant in the world of internet security.
In this edition, Brian and Gordon discuss the latest in cybersecurity news, including the Panama Papers, and Gordon talks to Mikko Hypponen, a giant in the world of internet security.
Mikko Hypponen is one of the nicest security guys on the planet. Chief Research Scientist at F-Secure, 25 year veteran of the security industry. Probably the BEST security orator in the world and this podcast is long overdue. We talk about threat landscape, some predictions, fads, trends, pinball, container security, ransomware etc. Tune in - we keep it real.
In our eighty-sixth episode of the Steptoe Cyberlaw Podcast, Stewart Baker and Michael Vatis discuss: ECJ’s Safe Harbor fallout continues: Israel cuts off data transfers to the US; Brad Smith’s implausible solution to the transatlantic data rift; House approves a bill extending data privacy rights to foreigners; Cybersecurity Information Sharing Act (CISA) comes to the floor with some interesting pending amendments; CIA director Brennan’s personal e-mail is hacked; and CrowdStrike says that Chinese government hackers are still stealing commercial secrets. In our second half we have an interview with Mikko Hypponen, Chief Research Officer at F-Secure, where we discuss his company’s recently published lengthy paper on Russian government cyberspies, which F-Secure calls “the Dukes.” The views expressed in this podcast are those of the speakers and do not reflect the opinions of the firm.
Interview with Mikko Hypponen To kick off our ten-year anniversary we interview Mikko Hypponen of F-Secure. We talk about the first virus discovered, reviewing printed viruses, and more. Visit our wiki for list of important links including the one that got him banned from Twitter: http://wiki.securityweekly.com/wiki/index.php/Episode438#Guest_Interview:_Mikko_Hypp.C3.B6nen_10:05_AM L0pht Heavy Industries Panel L0pht Heavy Industries was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area. We learn about the history of the L0pht and the future. Security Weekly Web Site: http://securityweekly.com Hack Naked Gear: http://shop.securityweekly.com Follow us on Twitter: @securityweekly
To kick off our ten-year anniversary we interview Mikko Hypponen of F-Secure. We talk about the first virus discovered, reviewing printed viruses, and more. Visit our wiki for list of important links including the one that got him banned from Twitter: http://wiki.securityweekly.com/wiki/index.php/Episode438#Guest_Interview:_Mikko_Hypp.C3.B6nen_10:05_AMSecurity Weekly Web Site: http://securityweekly.comHack Naked Gear: http://shop.securityweekly.comFollow us on Twitter: @securityweekly
Recorded live from the 27th Annual FIRST Conference in Berlin, Germany. Martin and Chris interview keynote and long-time supporter of the FIRST community, Mikko Hypponen, Chief Risk Officer, F-Secure. Mikko presented, “Securing Our Future,” on Tuesday, June 16th.
You Are Being Watched, Hacked, Bugged… by your own Government!!! The proof appears incontrovertible. Sheran James of The Sharin' Hour on KX 93.5 examines the erosion of our rights to privacy and civil liberty, with input from infamous whistleblower systems administrator Edward Snowdon; cybercrime expert Mikko Hypponen; and privacy researcher Christopher Soghoian. You'll be shocked […]
Have you heard of those scam phone calls from "Windows" where the person on the other end of the phone claims to know there's a problem with your computer ("Is it running more slowly lately?") and they even have you test it out by running some commands and referring to common files as viruses. Then they're so friendly that if you simply go to their web site and download a couple files, they'll clean it all up for you. Maybe one of the worst people they could possibly call would be the head guy at Black Hills Information Security, John Strand. Yep, and John was only too happy to give them just enough rope to hang themselves. Listen along for how John was also able to irritate the scammers. Then we tried to get going on the stories of the week and were off to a great start but very quickly got derailed with a story from Australia. Apparently the Australian government is looking to put a filter on the internet in their country that would completely block all perceived porn sites. If someone wants to be able to access porn web sites from inside Australia, they'd need to "opt out" of the filter by simply contacting the government. What could possibly go wrong with this idea? I'm certain that there wouldn't be any privacy issues whatsoever. Additionally, wasn't the internet basically invented for the purpose of porn consumption? Ok, back to the rest of the stories discussed. Remember a few weeks ago when we talked about a scumbag who intruded upon a family through their baby monitor and was able to shout at the baby and parents through the monitor. Well, the Federal Trade Commission (FTC) has slapped down a manufacturer of different brand of baby monitor and said they may no longer market their product as being "secure" until they fix these flaws. The flaws being that they say the feeds are private while anyone can view them on the internet at least in part because the authentication from the internet is clear-text and needs to be encrypted. Here we are already seeing where it seems like a great idea for manufacturers to internetify their product but don't completely understand all aspects of that or at least don't understand basic security needs. I don't know which is the chicken and which is the egg yet, but with the promise of IPv6, we're going to eventually see just about everything we own trying to have some sort of presence on the internet and these basic security precautions will need to be met. Allison alerted us to the fact that Burp Suite got an upgrade this week. I'm constantly amazed at how much Burp can do especially when you consider the $300 price. Sure, there's also ZAP available from OWASP for even cheaper (free) but I think Burp is one of those tools that just about everyone uses because of its awesomeness. If I had to pick out just one of the new features, I'd mention the "Plug 'n Hack". According to Portswigger: "This enables faster configuration of the browser to work with Burp, by automatically configuring the browser to use Burp as its proxy, and installing Burp's CA certificate in the browser." We also found out more details this week about another trojan called FinFisher by Gamma. The existence of FinFisher had been previously revealed but in a presentation by Mikko Hypponen, he talked about some of the things that the tool can do, including cracking WPA1 and WPA2, decrypting common email sites and even copying over a whole drive encrypted with TrueCrypt via a USB stick. Reportedly, the tool had only been available to governments in order to conduct their own national intelligence, but by now there's no way of knowing whether this has slipped out into the wild and in the hands of just anyone. At Black Hat this year, Mike Shema from Qualys talked about a new way to possibly prevent CSRF. As we've seen in the past, the only way to reliably prevent the attack is to place a token in the action and have the server validate that token. This requires that the developer of the application understand CSRF and understand an API for creating the token, and to also implement it properly. If you're in the training or penetration testing business, this sounds like a great thing for job security. However there are millions of developers worldwide and training all of them may take a while. Heck, look at how prevalent much simpler attacks like SQL injection and Cross Site Scripting are. Do we really think that we'll be able to "train away" CSRF? This is where Shema has the idea of "Session Origin Security" and put the token in the browser. Now instead of training millions of developers, we simply get about five browser developers to jump on board. But the gang was a little skeptical about other plugins to work around this as well as breaking valid sessions and backward compatibility. We also wondered whether it may make more sense to allow the browser to choose whether it wants the CSRF protection and turn it on by default and let the user turn it off if there's a good reason to. These all seem to be questions that Shema and his team are looking into. Jack told us about a post from Gunnar Peterson and the "Five Guys Burgers Method of Security". I don't think it means where it's so good for the first ten minutes and then you feel like crap about it for the next few hours. It's the idea that when you go to a Five Guys (and if you haven't yet, you should) they have two things, burgers and fries. They do these two things exceptionally well. They haven't morphed into also being a chicken place, and a fish place and a milkshake place and a coffee place and then letting the overall quality slip. They are focused on doing their two things and doing them extremely well. And I wondered if this is where so many in the security industry get frustrated and eventually burned out. As John brought up, the frustration often comes when there is so much compliance and documentation required, which yeah, I can see that as well. Who likes checking boxes and meeting with guys in ties to explain how you meet the PII, PCI, SOX and whatever other acronyms? I also wonder if there's also frustration in that we're hired to be "the security person" and we have areas that we're good at and enjoy. Whether that's network security, mobile security, web security or whichever. But due to budgets and many other reasons, we are expected to be experts in all areas, much unlike Five Guys. The Five Guys philosophy is if you want a great chicken sandwich, go to a chicken place. If you want a great milkshake, go to a milkshake joint. However in our jobs, we are the burgers and fries and chicken and fish and milkshakes and we're expected to be perfect at all of them. Anyway, it's an interesting take. Do you have a Web site? No? Ok, then you're probably safe. Robert "Rsnake" Hansen put together an infographic about all the different things that you need to worry about today when securing your web site. It started out as a joke but then got a bit too close to reality and finally just got head-shakingly scary. Finally, if you haven't already, check to see if your web site is "locked." Simply do a whois on your site and see if you have at a minimum a status of "ClientTransferProhibited." Some have said the recent NY Times hack was able to happen because the domain was not locked and the Syrian Electronic Army (SEA) was able to get the DNS credentials from someone and then change the DNS records to their own server. But if your DNS is locked, it'll take a bit more work to make the updates. Your registrar will go through additional validation steps before the DNS records are updated. This is likely enough that if someone is looking to hijack web sites, they'll realize yours isn't worth the both and move on to an easier target. With Congress possibly authorizing an attack on Syria and with the twelfth anniversary of the September 11, 2001 attacks upcoming, it would not be surprising to see another round of attacks on web infrastructure. So take this very easy step and protect your site.
Synopsis To kick off January on the Down the Rabbithole podcast I have Mikko Hypponen, the "malware adventurer" and Chief Resarch Officer from F-Secure Corp and we're talking about the state of malware and 'viruses' digging into the modern threat landscape and maybe digging up a bit of nostalgia from the late 90's. This is a fascinating conversation so I invite you to break out your old boot sector and COM viruses and join us for some interesting discussion! Guest Mikko Hypponen - Chief Research Officer at F-Secure Corp., TED speaker, and self-professed "malware adventurer". He can be found on Twitter at @Mikko
Wed, 01 Jun 2011 : : Chris John Riley talks to Friday Keynote, Mikko Hypponen about his upcoming presentation, "State of the Net" - 25 years and what have we got? This is a great chat covering such topics as the Brain virus to Stuxnet. Mikko is the Chief Research Officer at F-Secure (Finland) and has been with the company since 1991. Mikko has assisted law enforcement in the US, Europe and Asia on cybercrime cases. Mikko was most recently labeled an infosec rock star - according to information leaked by Wikileaks. Check out his talk at FIRST2011 on Friday, 17 June at 09:45.
Cyber crime - as we saw all too recently with the downed systems of Facebook, Twitter and others - occurs every day and costs billions of dollars in lost productivity and actual theft. Join Limor Schafman as she discusses with Mikko Hypponen of F-Secure what is the current status of cyber attacks, how organized crime works online, and why we can't seem to make this stop. Mr. Hypponen is the Chief Research Officer of F-Secure [F-Secure.com]. He was the first to warn of the Sasser attack in 2004 and named the Storm Worm in 2007. He will be a speaker at the upcoming NORDIC OSAC conference taking place in September [http://www.amcham.fi/Default.aspx?tabid=303]
Cyber crime - as we saw all too recently with the downed systems of Facebook, Twitter and others - occurs every day and costs billions of dollars in lost productivity and actual theft. Join Limor Schafman as she discusses with Mikko Hypponen of F-Secure what is the current status of cyber attacks, how organized crime works online, and why we can't seem to make this stop. Mr. Hypponen is the Chief Research Officer of F-Secure [F-Secure.com]. He was the first to warn of the Sasser attack in 2004 and named the Storm Worm in 2007. He will be a speaker at the upcoming NORDIC OSAC conference taking place in September [http://www.amcham.fi/Default.aspx?tabid=303]
Black Hat Briefings, USA 2007 [Video] Presentations from the security conference.
First real viruses infecting mobile phones were found during late 2004. Since then, hundreds of different viruses have been found, most of them targeting smartphones running the Symbian operating system. Mobile phone viruses use new spreading vectors such as Multimedia messages and Bluetooth. Why is this mostly a Symbian problem? Why hasn't Windows Mobile or Blackberry devices been targeted more? What makes the latest Symbian phones more secure? Why most of the infections are happening in Europe and in South-East Asia? And what will happen next?
Black Hat Briefings, USA 2007 [Audio] Presentations from the security conference.
First real viruses infecting mobile phones were found during late 2004. Since then, hundreds of different viruses have been found, most of them targeting smartphones running the Symbian operating system. Mobile phone viruses use new spreading vectors such as Multimedia messages and Bluetooth. Why is this mostly a Symbian problem? Why hasn't Windows Mobile or Blackberry devices been targeted more? What makes the latest Symbian phones more secure? Why most of the infections are happening in Europe and in South-East Asia? And what will happen next?
Should governments responde to cyber attack with deadly force? Senior researcher Mikko Hypponen and Prof. Itzik Ben Israel (Ret. General, IDF R&D) discuss this sensative question.Advertising Inquiries: https://redcircle.com/brands