Mikko Hypponen: Three types of online attack

From TED Translators Wiki
Jump to: navigation, search

This is a page of resources and discussion for "Mikko Hypponen: Three types of online attack"

The talk

TED http://www.ted.com/talks/mikko_hypponen_three_types_of_online_attack.html

YouTube http://www.youtube.com/watch?v=VM7HQ_zbdIw

dotSUB http://dotsub.com/view/63c89513-d2dd-47a7-bec0-94b4b69b0470

About the speaker

See Mikko Hypponen: Fighting viruses, defending the net.

Related resources

British firm offered spying software to Egyptian regime – documents http://www.guardian.co.uk/technology/2011/apr/28/egypt-spying-software-gamma-finfisher

More Info on German State Backdoor: Case R2D2 http://www.f-secure.com/weblog/archives/00002250.html

Germans Condemn Police Use of Spyware http://www.nytimes.com/2011/10/15/world/europe/uproar-in-germany-on-police-use-of-surveillance-software.html

Terms and expressions

Dimitry Golubov http://www.wired.com/politics/onlinerights/news/2007/01/72605

Vladimir Tsastsin http://krebsonsecurity.com/2011/11/malware-click-fraud-kingpins-arrested-in-estonia/

Stephen Watt http://www.wired.com/threatlevel/2009/06/watt/

Bjorn Sundin http://www.interpol.int/Wanted-Persons/(wanted_id)/2010-48145

Matthew Anderson http://nakedsecurity.sophos.com/2011/10/05/the-m00p-malware-investigation-was-justice-done/

Tariq Al-Daour http://globaljihad.net/view_page.asp?id=380

Sam Jain http://en.wikipedia.org/wiki/Sam_Jain

Anonymous http://en.wikipedia.org/wiki/Anonymous_(group)

DigiNotar http://en.wikipedia.org/wiki/DigiNotar

Certificate Authority http://en.wikipedia.org/wiki/Certificate_authority

Arab Spring http://en.wikipedia.org/wiki/Arab_Spring

FinFisher http://www.finfisher.com/FinFisher/en/index.php

a company based in Germany https://www.gammagroup.com/Default.aspx

implied power http://en.wikipedia.org/wiki/Implied_powers

Errata

112
00:04:40,000 --> 00:04:42,000
Somebody broke in
Somebody broke into

170
00:07:08,000 --> 00:07:11,000
the so-called Scuinst Trojan was found,
the so-called “State Trojan” was found,

178
00:07:27,000 --> 00:07:30,000
They will even use tools like Scuinst Trojan
They will even use tools like State Trojan