Mikko Hypponen: Three types of online attack
This is a page of resources and discussion for "Mikko Hypponen: Three types of online attack"
The talk
TED http://www.ted.com/talks/mikko_hypponen_three_types_of_online_attack.html
YouTube http://www.youtube.com/watch?v=VM7HQ_zbdIw
dotSUB http://dotsub.com/view/63c89513-d2dd-47a7-bec0-94b4b69b0470
About the speaker
See Mikko Hypponen: Fighting viruses, defending the net.
Related resources
British firm offered spying software to Egyptian regime – documents http://www.guardian.co.uk/technology/2011/apr/28/egypt-spying-software-gamma-finfisher
More Info on German State Backdoor: Case R2D2 http://www.f-secure.com/weblog/archives/00002250.html
Germans Condemn Police Use of Spyware http://www.nytimes.com/2011/10/15/world/europe/uproar-in-germany-on-police-use-of-surveillance-software.html
Terms and expressions
Dimitry Golubov http://www.wired.com/politics/onlinerights/news/2007/01/72605
Vladimir Tsastsin http://krebsonsecurity.com/2011/11/malware-click-fraud-kingpins-arrested-in-estonia/
Stephen Watt http://www.wired.com/threatlevel/2009/06/watt/
Bjorn Sundin http://www.interpol.int/Wanted-Persons/(wanted_id)/2010-48145
Matthew Anderson http://nakedsecurity.sophos.com/2011/10/05/the-m00p-malware-investigation-was-justice-done/
Tariq Al-Daour http://globaljihad.net/view_page.asp?id=380
Sam Jain http://en.wikipedia.org/wiki/Sam_Jain
Anonymous http://en.wikipedia.org/wiki/Anonymous_(group)
DigiNotar http://en.wikipedia.org/wiki/DigiNotar
Certificate Authority http://en.wikipedia.org/wiki/Certificate_authority
Arab Spring http://en.wikipedia.org/wiki/Arab_Spring
FinFisher http://www.finfisher.com/FinFisher/en/index.php
a company based in Germany https://www.gammagroup.com/Default.aspx
implied power http://en.wikipedia.org/wiki/Implied_powers
Errata
112 00:04:40,000 --> 00:04:42,000 Somebody broke in Somebody broke into 170 00:07:08,000 --> 00:07:11,000 the so-called Scuinst Trojan was found, the so-called “State Trojan” was found, 178 00:07:27,000 --> 00:07:30,000 They will even use tools like Scuinst Trojan They will even use tools like State Trojan