140
Bang

Account Suspended

This account is currently suspended and is being investigated due to strange activity. If we have suspended your account mistakenly, please let us know. See Suspended Accounts for more information.

Home

Trend Info

  1. Mikko H. Hypponenmikkohypponen Apparently www.nsa.gov was hacked [sql injection] last week: http://bit.ly/8WRWJ
  2. Mikko H. Hypponenmikkohypponen Got email from these guys. First time I ever saw a real .travel domain name in use: http://tomas.travel
  3. Mikko H. Hypponenmikkohypponen Very interesting interview with an ex-CIA spook by a Dutch radio: http://bit.ly/rzWXI [link to MP3, jump to 12:30 for the goods]
  4. Mikko H. Hypponenmikkohypponen From http://scr.im faq: "Your site looks ugly in IE!" - "Maybe. Don't know. Won't fix."
  5. Mikko H. Hypponenmikkohypponen Nifty tool to hide your email address: http://scr.im via @lennyzeltser.
  6. Mikko H. Hypponenmikkohypponen xkcd on linux users: http://bit.ly/hZ6Zk
  7. Mikko H. Hypponenmikkohypponen "Researchers noticed that when they registered a domain, the Mebroot gang would react" http://bit.ly/fYLcd - article by @roblemos
  8. Mikko H. Hypponenmikkohypponen So, in Australia they are running the power grid on Windows XP computers or what? http://bit.ly/E7mcC
  9. Mikko H. Hypponenmikkohypponen Make an impression: Print this is out and leave on top of your paper stacks: http://bit.ly/qkp7O [pdf from army.pentagon.mil]
  10. Mikko H. Hypponenmikkohypponen A wildcard SSL certificate available for download: http://bit.ly/2WoCBl
  11. Mikko H. Hypponenmikkohypponen Get online security with your frequent flyer points: http://bit.ly/Nsj1w
  12. Mikko H. Hypponenmikkohypponen Some Tweets and Google search results on "Samoa Earthquake" lead to malware: http://bit.ly/8YlRp Watch out.
  13. Mikko H. Hypponenmikkohypponen Pretty neat. I didn't know we could view live satellite images from the net. http://earthnow.usgs.gov
  14. Mikko H. Hypponenmikkohypponen IBM mainframes had a program with a purpose to do nothing. Turned out it would have problems correctly doing nothing. http://bit.ly/nfZZK
  15. Mikko H. Hypponenmikkohypponen Not sure if these files are supposed to be public, esp. "REQUEST FOR FORT KNOX SECRET NETWORK ACCOUNT.pdf"... http://bit.ly/BfbR7
  16. Mikko H. Hypponenmikkohypponen A local kidnap case is in court today. The kidnapper was tracked via his use of wi-fi to send ransom emails. http://bit.ly/1BdNuG
  17. Mikko H. Hypponenmikkohypponen World of Warcraft players: watch out for phishing sites. http://bit.ly/gZrnm
  18. Mikko H. Hypponenmikkohypponen Found a website called opensourcescripts.com - funny, I thought script programs were more or less open by definition... http://bit.ly/8VXbp
  19. Mikko H. Hypponenmikkohypponen Reddit blog on the Reddit XSS attack: "We were exploitable because we are open source": http://bit.ly/145Kdb
  20. Mikko H. Hypponenmikkohypponen The daily dose of Assembler (and Java). Do watch the video! http://bit.ly/28nrh
  21. Mikko H. Hypponenmikkohypponen Great coverage by Nart & Greg on espionage attacks targeting Reuters, the Straits Times, Dow Jones, AFP etc: http://bit.ly/2QOnPC
  22. Mikko H. Hypponenmikkohypponen A cyber criminal jailed for stealing millions was asked to write software for the jail. Surprise, he hacked the system: http://bit.ly/XSlDM
  23. Mikko H. Hypponenmikkohypponen Attack on Reddit is over (for now). Read the details from http://bit.ly/1wmSL
  24. Mikko H. Hypponenmikkohypponen Script-based malware on Reddit.com. Log off from Reddit before clicking on any links there to protect yourself.
  25. Mikko H. Hypponenmikkohypponen "The last time Google visited this site was on 2009-09-26" (Google's diagnostic page for google.com): http://bit.ly/xSzyl
  26. Mikko H. Hypponenmikkohypponen Byron sums up the Twitter attacks of the week: http://bit.ly/11rbZn
  27. Mikko H. Hypponenmikkohypponen A cartoon about the Advanced Encryption Standard (AES). Really. http://bit.ly/156k6m
  28. Mikko H. Hypponenmikkohypponen We've released F-Secure Health Check 2.0 Beta - free vulnerability scanner: http://bit.ly/u9SAb
  29. Mikko H. Hypponenmikkohypponen From #VB2009 conference: Juraj from ESET talking about websites of rogue malwares: "Their sites look great. They look better than ours..."
  30. Mikko H. Hypponenmikkohypponen F-Secure has released Rescue CD 3.11 - free recovery tool. Now includes photo recovery utility: http://bit.ly/rd0mo
  31. Mikko H. Hypponenmikkohypponen Twitter admins are killing of auto-generated accounts (see http://bit.ly/da8hL), but new users like schomburg1654 & hundertmark648 pop up!
  32. Mikko H. Hypponenmikkohypponen Think about it: When you booted up Windows 98 and couldn't remember the password, you could just hit Cancel to boot up anyway!
  33. Mikko H. Hypponenmikkohypponen Criminals are mass-generating fake Twitter accounts for profit: http://bit.ly/owG6j Be careful.
  34. Mikko H. Hypponenmikkohypponen Handy way to store 64GB of data inside a coin: http://bit.ly/Gj1HK
  35. Mikko H. Hypponenmikkohypponen Security / Safety video of the weekend (Chevy 1959 vs Chevy 2009): http://bit.ly/4x95LT
  36. Mikko H. Hypponenmikkohypponen Here's an example of spammers paying money to Google: http://bit.ly/eI5Bq
  37. Mikko H. Hypponenmikkohypponen A hacker forum got hacked: http://bit.ly/3NB9Sp
  38. Mikko H. Hypponenmikkohypponen Never thought of that! Somebody registered immaletyoufinish.com - http://whois.sc/immaletyouf...
  39. Mikko H. Hypponenmikkohypponen Mongolia is .mn on the net. I've *never* seen a *real* .mn site: only phishing sites like mybank.alliance-leicester.co.uk.fcvttp5.mn...
  40. Mikko H. Hypponenmikkohypponen Being a "Jackass" is of more interest than being "A Beautiful Person" it seems, http://bit.ly/1onOFC (via @FSLabsAdvisor)
  41. Mikko H. Hypponenmikkohypponen Considering how common NGINX server is in botnet use, this would make it easy to pwn some online criminals... http://bit.ly/1e1Ijj
  42. Mikko H. Hypponenmikkohypponen From WrongTees.com ToS: "If your shirt doesn't turn night into day, just send that sucker back for a full refund" http://bit.ly/2u54BK
  43. Mikko H. Hypponenmikkohypponen Helpful when locating fresh malicious sites etc. Add this to a Google search URL to find sites created within last 15 hours: &tbs=qdr:h15
  44. Mikko H. Hypponenmikkohypponen What a surprise: malware authors cashing in with the news of the death of Patrick Swayze: http://bit.ly/sjM1J #sw
  45. Mikko H. Hypponenmikkohypponen H Security writes about a Linux botnet: http://bit.ly/jZO0V
  46. Mikko H. Hypponenmikkohypponen Phone MMS vulnerability found in some devices, including Blackberries and Windows Mobile: http://bit.ly/WIRTW
  47. Mikko H. Hypponenmikkohypponen Such a shame that Jack C Louis passed away before he could see this published: http://bit.ly/UGau1
  48. Mikko H. Hypponenmikkohypponen Protecting the Nokia Booklet 3G against viruses: http://bit.ly/yTn87
  49. Mikko H. Hypponenmikkohypponen HTML source code of http://www.fujinonbinos.com rocks! See http://bit.ly/3MkEMF (via @tomituominen)
  50. Mikko H. Hypponenmikkohypponen XKCD nails it with chat spambots: http://xkcd.com/632
  51. Mikko H. Hypponenmikkohypponen The difference on how Apple OS X shows a connected Mac server or a connected PC server... http://bit.ly/4f7HS
  52. Mikko H. Hypponenmikkohypponen Hacking Nintendo DSi: http://bit.ly/5wRmK
  53. Mikko H. Hypponenmikkohypponen The FTP server that time forgot: ftp://ftp.microsoft.com - including files from 1993 and directories called 'garbage' or 'junk'...
  54. Mikko H. Hypponenmikkohypponen First winner in T2 challenge found: http://bit.ly/1cECU9
  55. Mikko H. Hypponenmikkohypponen Here's a 3-minute video with me and Sean taking a look at our latest product: https://www.youtube.com/fslabs
  56. Mikko H. Hypponenmikkohypponen Win a Nikon D60 SLR camera by sending a Tweet! Competition by F-Secure / @FSecure. See http://bit.ly/cznad
  57. Mikko H. Hypponenmikkohypponen An ATM that speaks...Cockney? http://bit.ly/ietkA
  58. Mikko H. Hypponenmikkohypponen F-Secure Internet Security 2010 is *out*. If you're an existing customer, you can upgrade *now* for free. You should. http://bit.ly/vL8fb
  59. Mikko H. Hypponenmikkohypponen We've changed our logo: http://bit.ly/vL8fb
  60. Mikko H. Hypponenmikkohypponen The fight on what word "hacker" means was lost long time ago. Public thinks hacker == criminal so that's how it is then (reply to @41414141)
  61. Mikko H. Hypponenmikkohypponen ...and "Most Wanted" poster for hacker "Wolf" http://bit.ly/reIX7 [pdf]
  62. Mikko H. Hypponenmikkohypponen "Most Wanted" poster for hacker "DoZ": http://bit.ly/NTpX6
  63. Mikko H. Hypponenmikkohypponen By popular demand; here's the last 30 seconds of my presentation at Black Hat 2009: http://bit.ly/1ib8tk
  64. Mikko H. Hypponenmikkohypponen This can't be right. HP explains how to install Mac software: 'Download MacBackupClient.exe to your Windows desktop'... http://bit.ly/PBWPL
  65. Mikko H. Hypponenmikkohypponen It's too bad, but we're loosing @patrikrunald from our gang here at F-Secure. All the best for your new gig at Websense, mate!
  66. Mikko H. Hypponenmikkohypponen Nice collection of computer security videos: http://www.securitytube.net/
  67. Mikko H. Hypponenmikkohypponen Handy way to increase the amount of available memory on your computer... http://www.downloadmoreram.com
  68. Mikko H. Hypponenmikkohypponen Ingenious laptop theft prevention device: http://bit.ly/2LXEsQ
  69. Mikko H. Hypponenmikkohypponen T2 Challenge has started NOW at http://t2.fi/challenge
  70. Mikko H. Hypponenmikkohypponen The inside story behind the NCUA CD-ROM Penetration test: http://stateofsecurity.com/...
  71. Mikko H. Hypponenmikkohypponen 50% of all the web servers run Apache. Apache is distributed from apache.org. And apache.org was hacked today: http://bit.ly/Bf928
  72. Mikko H. Hypponenmikkohypponen Maybe this was another penetration test? Similar to the NCUA CD-ROMs? http://bit.ly/JOxCl (via @bobmcmillan)
  73. Mikko H. Hypponenmikkohypponen Nice bug report: Expected Result? "An X button" What Happens Instead? "Some guys head" http://bit.ly/PIqWs
  74. Mikko H. Hypponenmikkohypponen I find it ironic that the file I was linking to in my previous Tweet is a PDF. I'm assuming many will be using Adobe Reader to open it...
  75. Mikko H. Hypponenmikkohypponen Of all Adobe Flash users, 79% run a vulnerable version. Of Adobe PDF Reader users, 83% are vulnerable. http://bit.ly/2BQeSh [pdf] #adobefail
  76. Mikko H. Hypponenmikkohypponen Unusual attack vector - mailing CD-ROMs to Credit Unions: http://bit.ly/3wSQYl #NCUA
  77. Mikko H. Hypponenmikkohypponen It's amazing. It's the end of August, and Conficker is *still* generating traffic from over 6 million IPs! http://bit.ly/lUSab
  78. Mikko H. Hypponenmikkohypponen IceGold is NOT back: http://bit.ly/9dcX5
  79. Mikko H. Hypponenmikkohypponen Handy How-To: How to use your 1980s mobile phone as a computer case: http://bit.ly/14tQkx
  80. Mikko H. Hypponenmikkohypponen Two nice links for packet capture fanatics: http://bit.ly/nnxzl & http://bit.ly/lyWYp
  81. Mikko H. Hypponenmikkohypponen Who's behind these attacks? http://bit.ly/CsKGk - we sure have no idea.
  82. Mikko H. Hypponenmikkohypponen How to name your Wi-Fi router if you want to keep others out: http://imgur.com/NcCcd.png
  83. Mikko H. Hypponenmikkohypponen DEFCON'09 slides are out: http://bit.ly/KOMGb, my picks: http://bit.ly/U4gWC, http://bit.ly/ljBh8, http://bit.ly/1664Az, http://bit.ly/GZbN5
  84. Mikko H. Hypponenmikkohypponen I guess there's nothing illegal in selling social network bots. Hmm. http://allbots.info/
  85. Mikko H. Hypponenmikkohypponen Slides & Videos from USENIX Security '09, held last week in Canada: http://bit.ly/15u3th
  86. Mikko H. Hypponenmikkohypponen I was checking out who owns http://vir.us - turns out it's a site that has nothing to do with computer security. HIV education!
  87. Mikko H. Hypponenmikkohypponen Interesting botnet write-up by Cisco: http://bit.ly/13Uh9I
  88. Mikko H. Hypponenmikkohypponen Was Australian Police hacked or not? I don't think so. My take: http://bit.ly/1ro8cD
  89. Mikko H. Hypponenmikkohypponen Does anyone else see any correlation between these two? http://bit.ly/3At6B0 (1984) and http://bit.ly/1LayWO (2009)
  90. Mikko H. Hypponenmikkohypponen Schools restart this soon. Print this out and give to a high schooler to read: http://paulgraham.com/hs.html
  91. Mikko H. Hypponenmikkohypponen DDoS attacks on gambling sites: in addition of Danskespil.dk, Veikkaus.fi has been under attack as well (in reply to @peterkruse)
  92. Mikko H. Hypponenmikkohypponen There seems to be an industry making tools for graffiti purposes. I had no idea. http://bit.ly/FT5Yd I thought it's illegal or something.
  93. Mikko H. Hypponenmikkohypponen When a Mexican drug lord gets busted, this is what you'll find: http://bit.ly/Zs5HA
  94. Mikko H. Hypponenmikkohypponen How to use Javascript 'getElementsByTagName' to regain your lost website passwords: http://bit.ly/236hb1
  95. Mikko H. Hypponenmikkohypponen A hotel had a 0.01€ mistake fare for a hotel room. After 5000 bookings they try to escape by claiming they were hacked: http://bit.ly/38z0V
  96. Mikko H. Hypponenmikkohypponen Interesting security visualizations: http://bit.ly/1zFn4y
  97. Mikko H. Hypponenmikkohypponen Sometimes it takes more than two years to fix a vulnerability: http://bit.ly/QYTTw
  98. Mikko H. Hypponenmikkohypponen Hacker forum r00t-y0u.org has this on their front page right now. We can't confirm if this is true or not: http://twitpic.com/dpi7j
  99. Mikko H. Hypponenmikkohypponen NY Times (mobile security): "iPhones worldwide barely register. Instead, it is Nokia mobile phones that reign supreme." http://bit.ly/bhyiM
  100. Mikko H. Hypponenmikkohypponen Interesting hardware device. Handy if you're really serious about breaking passwords. http://bit.ly/H1Xr
  101. Mikko H. Hypponenmikkohypponen I'm not entirely sure if this security camera was supposed to be connected to the public net or not: http://bit.ly/SOkSH
  102. Mikko H. Hypponenmikkohypponen "..our cards are skimmed in the most exclusive places (casinos, hotels, VIP clubs) using the most sophisticated devices" http://bit.ly/ZbNui
  103. Mikko H. Hypponenmikkohypponen Fairly nice design for a site...considering the site is about selling stolen credit cards: http://www.freshdumps.net
  104. Mikko H. Hypponenmikkohypponen It was 5 years ago today. Here's VANITY FAIR's 10-page article on the BLASTER worm outbreak: http://bit.ly/ILhP4
  105. Mikko H. Hypponenmikkohypponen "It’s the biggest botnet in the world, and nobody cares". Commentary from @Vmyths: http://bit.ly/19xzvL
  106. Mikko H. Hypponenmikkohypponen So, what can be done in 4096 bytes? Here's the winner of the 4k demo competition in Asm 2009: http://bit.ly/Mtx9s
  107. Mikko H. Hypponenmikkohypponen There's also something twisted about the http://tweak.tk service. For every URL you shorten, they create a new .tk domain name...
  108. Mikko H. Hypponenmikkohypponen Bit.ly is probably the best to replace tr.im. But I *really* like the cleverness of the Tinyarrows people! See http://›.ws/吃
  109. Mikko H. Hypponenmikkohypponen One last tr.im link from me: The http://tr.im url shortening service is shutting down, effective immediatly.
  110. Mikko H. Hypponenmikkohypponen There seems to be some discussion about the "Digsby" IM / FB / Twitter client having hidden functionality using your idle CPU power.
  111. Mikko H. Hypponenmikkohypponen My commentary on case "Silence Cyxymu": http://bit.ly/16f3fH #DDoS
  112. Mikko H. Hypponenmikkohypponen Clever anti-theft device for Nokia N97 smartphones: http://bit.ly/h5zaF
  113. Mikko H. Hypponenmikkohypponen Only 9 rogue Wi-Fi access points detected this year at Black Hat. At DEF CON? Nobody knows... http://bit.ly/eSetp
  114. Mikko H. Hypponenmikkohypponen The blacklist Twitter is now using to block malicious URLs has been confirmed to be Google's Safe Browsing API.
  115. Mikko H. Hypponenmikkohypponen While making the previous Tweet I discovered that Twitter is now filtering bad URLs! See http://bit.ly/Im2FS - great!
  116. Mikko H. Hypponenmikkohypponen I guess somebody will fall for it...a desperate Myspace phishing site at www. rnyspece. com. (don't go there).
  117. Mikko H. Hypponenmikkohypponen Around 24 hours after Mulliner & Miller released details on the iPhone SMS vulnerability, Apple has now released a patch for it. #blackhat
  118. Mikko H. Hypponenmikkohypponen Why Mythbusters will not be covering RFID. http://bit.ly/9CU8E #defcon
  119. Mikko H. Hypponenmikkohypponen The published whitepapers and slides from Black Hat'09 speakers are online at http://bit.ly/152kl8 #blackhat
  120. Mikko H. Hypponenmikkohypponen The iPhone remote execute SMS would show up as one msg with a square in it. So I've now been sending a "□" message to all iPhoners #blackhat
  121. Mikko H. Hypponenmikkohypponen The Pwnie Awards are underway at Black Hat. "The Twitter Hack" just one the award for Most Epic Fail. #blackhat
  122. Mikko H. Hypponenmikkohypponen I think @a_greenberg managed to get my name wrong in three different ways in this Forbes article: http://bit.ly/uYWkF Hi Andy!
  123. Mikko H. Hypponenmikkohypponen Does this link work for you? http://bit.ly/3XvXky :)
  124. Mikko H. Hypponenmikkohypponen Watch out for malicious shortcuts: http://bit.ly/4tpFM
  125. Mikko H. Hypponenmikkohypponen This is great. Read the bullet point list to the end... http://bit.ly/LmH6w
  126. Mikko H. Hypponenmikkohypponen Black Hat has a nice system at https://blackhat09.sched.org - allows you to compare who goes to see what talk. I reg'd account 'root' :)
  127. Mikko H. Hypponenmikkohypponen We made a short Youtube video to show what the "Sexy Space" mobile phone text message worm looks like: http://bit.ly/oGSAw
  128. Mikko H. Hypponenmikkohypponen "Did you mean: recursion"? http://bit.ly/3hlzi
  129. Mikko H. Hypponenmikkohypponen No idea what is the "Assembly 2009 demo party"? Here's a picture: http://bit.ly/ZYWPZ - watch out, it's 6000 pixels wide.
  130. Mikko H. Hypponenmikkohypponen Assembly 2009 demo party Invitation Intro has been released: http://bit.ly/vH63L [Win32 EXE] and http://bit.ly/oJ447 [Youtube]. We sponsor.
  131. Mikko H. Hypponenmikkohypponen Turns out symantecs.com.tw is not Symantec, kabsersky.com is not Kaspersky and adobeupdating.com is not Adobe: http://bit.ly/4qs1E6
  132. Mikko H. Hypponenmikkohypponen Picture of a South Korean street demonstration against Cyber Terror. Sorry, what? http://bit.ly/12Wn3U
  133. Mikko H. Hypponenmikkohypponen Funny how-to: "Make $$ selling Steam accounts". Starts by: "Things you will need: A little bit of knowledge on phishing" http://bit.ly/B8ZFp
  134. Mikko H. Hypponenmikkohypponen The new Adobe 0day has been used in a handful of targeted attacks against NGOs. Done with PDF files with embedded flash.
  135. Mikko H. Hypponenmikkohypponen Nice! One of the Pwnie award nominees for best song; "50 Ways to Inject Your SQL": http://bit.ly/1eq72y
  136. Mikko H. Hypponenmikkohypponen Posted more pics of trojanized documents used in targeted attacks - some maybe NSFW: http://bit.ly/a94eF
  137. Mikko H. Hypponenmikkohypponen Official cleaner for the Blackberry Etisalat spyware: http://bit.ly/6HSSk
  138. Mikko H. Hypponenmikkohypponen Very funny: http://bit.ly/3Vh6sw - Javascript humor
  139. Mikko H. Hypponenmikkohypponen This code landed us on the moon: http://bit.ly/32pTDQ via @adafruit
  140. Mikko H. Hypponenmikkohypponen Pre-Release Info on DEFCON 2009 conference badge released by @JoeGrand: http://bit.ly/UMgPL - the badge runs on a Freescale MC56F8006 32MHz
  141. Mikko H. Hypponenmikkohypponen Hey, @BrianKrebs noticed an interesting connection! Compare slogans from http://www.junior-group.cn/ and ad #3 from http://bit.ly/2QHBO
  142. Mikko H. Hypponenmikkohypponen Our Linux team has released the latest version of our free RESCUE CD / USB combo. Get the ISO from http://bit.ly/SriUn
  143. Mikko H. Hypponenmikkohypponen Found a H1N1-themed malware. More here: http://bit.ly/CUIdt
  144. Mikko H. Hypponenmikkohypponen Michael Jackson malware is not dead: http://bit.ly/eeVko
  145. Mikko H. Hypponenmikkohypponen I just posted a quick Q & A on the "Sexy View" text message worm: http://bit.ly/yemod
  146. Mikko H. Hypponenmikkohypponen I'm looking at targeted malware that was using hostnames under http://ddns.nu - turns out DDNS has now stopped giving out new accounts.
  147. Mikko H. Hypponenmikkohypponen Anatomy Of The Twitter Attack. Good research by @Cubrilovic: http://bit.ly/11oGbw
  148. Mikko H. Hypponenmikkohypponen Have you ever wondered where all these damn SEO spam blogs are coming from? They are being created with products like http://wpdirect.com
  149. Mikko H. Hypponenmikkohypponen Is there a site that takes a RSS feed with abridged content, gets the full unabridged content and makes a new RSS feed out of it? Anybody?
  150. Mikko H. Hypponenmikkohypponen nmap 5 is out: http://nmap.org
  151. Mikko H. Hypponenmikkohypponen Robert is going to Mars. http://imgur.com/QHKXu.png
  152. Mikko H. Hypponenmikkohypponen Great blog post from Linus Torvalds about him buying various gadgets which turn out to run Linux as the OS... http://bit.ly/XoeJk
  153. Mikko H. Hypponenmikkohypponen Reverse Engineering cartoon from Sapheads: http://bit.ly/BFXNB
  154. Mikko H. Hypponenmikkohypponen Just checked the Smartphone market share numbers. iPhone already has 10% of the market! Symbian dropped to 49% http://bit.ly/10uBdn
  155. Mikko H. Hypponenmikkohypponen Audio of the Roundtable I participated in Sydney on Wednesday; The future of Digital Economy: http://bit.ly/K9jHY Recorded by @riskybusiness
  156. Mikko H. Hypponenmikkohypponen Imageshack is removing the images of the Anti-sec hack. Here's what Anti-sec tried uploading over all other images: http://twitpic.com/9zg5g
  157. Mikko H. Hypponenmikkohypponen F-Secure acquires Steek. See @Steek and http://steek.com and http://steekr.com
  158. Mikko H. Hypponenmikkohypponen South African ATMs will launch pepper spray if they detect someone trying to install a card skimmer. http://bit.ly/GzhBs via @teamcymru
  159. Mikko H. Hypponenmikkohypponen Also http://www.usfk.mil seems to be down now. This is the Official United States Armed Forces Korea site.
  160. Mikko H. Hypponenmikkohypponen The .COM DDoS targets: nyse.com, nasdaq.com, finance.yahoo.com, usbank.com, washingtonpost.com, ustreas.gov, usauctionslive.com. Last down.
  161. Mikko H. Hypponenmikkohypponen FTC is hurt most of the .GOV DDoS targets: whitehouse.gov, faa.gov, dhs.gov, state.gov, defenselink.mil, usfk.mil, ustreas.gov, ftc.gov.
  162. Mikko H. Hypponenmikkohypponen milw0rm is shutting down. http://milw0rm.com/
  163. Mikko H. Hypponenmikkohypponen This morning here in Australia I will be interviewed live by @lisacc on Sky Morning News at 7:45am.
  164. Mikko H. Hypponenmikkohypponen Nice chat log of a 13-year old trying to steal a Valve Online password and getting pwned: http://bit.ly/kJTYh (from FutureMark forums)
  165. Mikko H. Hypponenmikkohypponen Btw: I'll be in Australia most of next week. Anybody want to have a beer in downtown Sydney?
  166. Mikko H. Hypponenmikkohypponen After 25 years, an easter egg for Donkey Kong has been found (Atari 800): http://bit.ly/gEkRS
  167. Mikko H. Hypponenmikkohypponen Ukrainian criminals added 25 money mules as "phantom" employees of state of Kentyucky, paid them $415K salary! http://bit.ly/19TpKr Go Brian
  168. Mikko H. Hypponenmikkohypponen I compiled a collection of screenshots of bait document files used in targeted malware attacks. Some neat ones. http://bit.ly/OSdA2
  169. Mikko H. Hypponenmikkohypponen Had a really good chat with Eric Auchard yesterday on Good / Evil and technology. Here's his article on the topic: http://bit.ly/gR0RU
  170. Mikko H. Hypponenmikkohypponen Month of Twitter bugs - first bug (related to bit.ly) at http://www.twitpwn.com
  171. Mikko H. Hypponenmikkohypponen Black Hat USA talk on ATM security gagged and cancelled, reports @riskybusiness: http://bit.ly/tk3WQ
  172. Mikko H. Hypponenmikkohypponen We just released a short video wrapping up the year so far security-wise: http://bit.ly/HSEU8 also see https://www.f-secure.com/2009/
  173. Mikko H. Hypponenmikkohypponen Feel free to follow the folders, but do not type in your details: kathynails.com/holahola/ (it's a live phishing site)
  174. Mikko H. Hypponenmikkohypponen Just found another "Michael Jackson" malware. This one shows a Youtube video to the user: http://bit.ly/4StIr
  175. Mikko H. Hypponenmikkohypponen Max "Iceman" Butler of CardersMarket.com pleads guilty for 86$M credit card hack. News: http://bit.ly/wMXCI Background: http://bit.ly/s8rQo
  176. Mikko H. Hypponenmikkohypponen Real-world example: C:\exploit_hosting\new_exp_downloader_with banned_ip2_user_agent_spyware_like_codec_nginx ipserver_eu_firewall_dis\
  177. Mikko H. Hypponenmikkohypponen Note to malware authors: It really helps our work when you leave full file paths inside your binaries. Thanks.
  178. Mikko H. Hypponenmikkohypponen Plenty of Twitter commentary on the FIRST conference for those of us who didn't make it to Kyo-To. See #FIRST2009
  179. Mikko H. Hypponenmikkohypponen Some details of one "Michael Jackson" malware we analysed today: http://bit.ly/3gPaOc
  180. Mikko H. Hypponenmikkohypponen A letter I wrote for Financial Times: http://bit.ly/2DeCh - and a response to it: http://bit.ly/LULWh
  181. Mikko H. Hypponenmikkohypponen Hey, I've been exactly three months on Twitter today. Cheers to all the 1,410 followers! http://bit.ly/qm6WY
  182. Mikko H. Hypponenmikkohypponen Phrack issues from #1 (released in November 1985) to #66 (released today): http://www.phrack.org/issue...
  183. Mikko H. Hypponenmikkohypponen Mr Dreyer and Dreyfus died in AF447 crash. Two of the world’s most prominent foes against illegal arms trade. http://www.smallarmssurvey.org
  184. Mikko H. Hypponenmikkohypponen FYI: I'm on my summer holiday and Tweeting much less (focusing on beer). However, here's pics from my visit to IMPACT HQ http://bit.ly/CtGzM
  185. Mikko H. Hypponenmikkohypponen Heyyy, turns out my presentation for Black Hat 2009 got accepted. See you in Vegas.
  186. Mikko H. Hypponenmikkohypponen My comments on President Obama's cybersecurity plan are here, via New York Times: http://bit.ly/hnp4U
  187. Mikko H. Hypponenmikkohypponen The US President is right now talking about securing Cyber Infrastructure. Live feed: http://bit.ly/4F6rF5
  188. Mikko H. Hypponenmikkohypponen Bush administration authorized several computer-based attacks, says John Markoff: http://bit.ly/NtjoW
  189. Mikko H. Hypponenmikkohypponen Debug script line feeds don't really survive in Tweets...you can get the intact script from here: http://hypponen.com/yeah/ye...
  190. Mikko H. Hypponenmikkohypponen I hope Yeah.com works on your system. At least worked on my XP SP2 box.
  191. Mikko H. Hypponenmikkohypponen e0120 32 04 24 1F AA E2 EC 59 E2 E2 83 07 10 EB D9 89 e0130 0C DF 04 D9 C0 DE 07 DE 74 04 D9 FE DE 4C 14 C3 RCX 40 W Q
  192. Mikko H. Hypponenmikkohypponen n Yeah.com e0100 B0 13 CD 10 68 00 A0 07 31 FF B1 C8 E8 20 00 51 e0110 B9 40 01 E8 19 00 D8 C3 DF 1C D8 E3 8A 04 DF 1C
  193. Mikko H. Hypponenmikkohypponen To commemorate the legacy of DEBUG.EXE: Save the next two Tweets to YEAH.DBS, type "DEBUG < YEAH.DBS" from CMD and then run the result.
  194. Mikko H. Hypponenmikkohypponen Windows 7 will ship without DEBUG.EXE. Not that I would really need it much, but somehow this makes me sad... http://bit.ly/VIdAj
  195. Mikko H. Hypponenmikkohypponen Longest Tweet ever: ₧₧₧₧₧₧ ₧₧₧₧₧₧₧₧₧₧₧₧₧₧ ₧₧₧₧₧₧₧₧₧₧₧₧₧₧ ₧₧₧₧₧₧₧₧₧₧₧₧₧₧ ₧₧₧₧₧₧₧₧₧₧₧₧₧₧ ₧₧₧₧₧₧₧₧₧₧₧₧₧₧ ₧₧₧₧₧₧₧₧₧₧₧₧₧₧ ₧₧₧₧₧₧₧₧₧₧₧₧₧₧ ₧₧₧₧₧₧₧!
  196. Mikko H. Hypponenmikkohypponen RTing myself (last time apparently Firefox did not show my Tweet). The Longest Tweet ever (over 350 characters...)
  197. Mikko H. Hypponenmikkohypponen Twittercut has been shut down. According to their own account, they had no phishing plans.
  198. Mikko H. Hypponenmikkohypponen New Twitter phishing scam. Ignore messages like "OMG I just got over 1000 followers today from twittercut. com". Don't go there.
  199. Mikko H. Hypponenmikkohypponen Turns out at least *some* Swedes can code. Reverse engineering Spotify: http://bit.ly/ry50m
  200. Mikko H. Hypponenmikkohypponen Here's a good idea: Write Your Passwords on Post-it notes. Seriously. http://bit.ly/Yd40N
  201. Mikko H. Hypponenmikkohypponen I just walked through our new Lab in Kuala Lumpur and shot a short video: http://bit.ly/MuJqz
  202. Mikko H. Hypponenmikkohypponen Japanese translation of our blog is available at: http://blog.f-secure.jp - RT @gohsuket F-Secureのブログポストが日本語訳で読める
  203. Mikko H. Hypponenmikkohypponen Thanks for asking, @gcluley but no, I don't do Klingon. Haven't seen any Star Trek yet...I think I've only seen the 1977 Star Wars.
  204. Mikko H. Hypponenmikkohypponen I see that some phone operators are now offering anonymous prepaid flat rate 3G data plans. Apparently criminals are the target group?
  205. Mikko H. Hypponenmikkohypponen I'm tempted to call bullshit on the "Nokia 1100 hack"...but I guess we'll have to doublecheck this again. http://bit.ly/VNGJ
  206. Mikko H. Hypponenmikkohypponen Another possible Twitter phishing site: www. tweet.ro. Do not enter your username & password there.
  207. Mikko H. Hypponenmikkohypponen Do not mix the Twitter phishing site tvviter.com (registered last week) to tvvitter.com (registered in 2007). To @lseltzer & others.
  208. Mikko H. Hypponenmikkohypponen Watch out. List of Twitter accounts used in the "tvviter.com" phishing scam: http://bit.ly/4BCXtt - for more, check @gcluley
  209. Mikko H. Hypponenmikkohypponen Virut is a very common virus. 20kB. Parasitic. Polymorphic. Installs rogues. Clicks on ads. Good info at http://bit.ly/gYkVY via @RighardZw
  210. Mikko H. Hypponenmikkohypponen Good news. Adobe takes the MSFT way, will begin shipping security patches on the second Tuesday of every *third* month. http://bit.ly/ha8iv
  211. Mikko H. Hypponenmikkohypponen Found a tool that'll tell you if somebody's phone is on or off, without the alerting the user. Haven't tried it, though. http://bit.ly/55cyq
  212. Mikko H. Hypponenmikkohypponen We used to have a Mac product - it got dropped due to lack of threats. Now we're back! F-Secure for Mac (beta): http://bit.ly/19pd0W
  213. Mikko H. Hypponenmikkohypponen F-Secure Online Backup encrypts files locally using 3DES, and the upload is over a SSL tunnel. Thanks for asking, @ju916.
  214. Mikko H. Hypponenmikkohypponen How do you like the look of our new lab in Kuala Lumpur? http://bit.ly/hf6XP
  215. Mikko H. Hypponenmikkohypponen Browsable online shop for blank credit cards. Wow. http://imagine-supplies.110...
  216. Mikko H. Hypponenmikkohypponen http://bit.ly/da8hL What's wrong with Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; AntivirXP08; .NET CLR 1.1.4322; .NET CLR 2.0.50727)
  217. Mikko H. Hypponenmikkohypponen AusCERT conference is in full swing. We who did not make it to Australia can follow it via #auscert tweets. Seems busy!
  218. Mikko H. Hypponenmikkohypponen I wonder how many text messages the phone at number +3396003964 must be receiving... http://google.com/search?q=...
  219. Mikko H. Hypponenmikkohypponen Project WORM via Wreckamovie: http://bit.ly/16W9Py and http://bit.ly/rcYKm
  220. Mikko H. Hypponenmikkohypponen Wolfram|Alpha is open. Seems cool. Trying to think of security angles to it.
  221. Mikko H. Hypponenmikkohypponen Competwition winners 3/3: @mrbellek, @marksunner, @lancejssc, @treguly, @_natron_, @windexh8er, @mattjay
  222. Mikko H. Hypponenmikkohypponen Competwition winners 2/3: @zfasel, @jolly, @ghostnomad, @daveoj, @thierryzoller, @edsmiley, @nflnfl, @richardebaker, @MarketingMel
  223. Mikko H. Hypponenmikkohypponen Competwition winners 1/3: @atarii, @geekgrrl, @cyberlocksmith, @whiz, @craigbalding, @TimelessP, @xme, @domdingelom, @danilima
  224. Mikko H. Hypponenmikkohypponen Coming up: The 25 winners of the geek sticker Competwition! Winners: email your mailing address to nerds@f-secure.com to get your prize.
  225. Mikko H. Hypponenmikkohypponen The Mystery Girl turned out to be Leah Dizon: http://leah-dizon.net/ - thanks @bolzano_1989!
  226. Mikko H. Hypponenmikkohypponen While analysing malicious DOC files I came across one that displayed this. Anyone recognize the girl? http://twitpic.com/57jdi
  227. Mikko H. Hypponenmikkohypponen We've released our online backup product at http://my.f-secure.com/ - Backup as much as you want: NO GB LIMITS!
  228. Mikko H. Hypponenmikkohypponen The fake "storeandtrade.co.uk" site is related to some Russian / Ukrainian anti-captcha services as well as bankitrade.com exploit site.
  229. Mikko H. Hypponenmikkohypponen Storeandtrade is the fake one. Done quite well: their domain info http://bit.ly/pLwup and IP info http://bit.ly/QRump look quite convincing.
  230. Mikko H. Hypponenmikkohypponen One of these is a real company, one is fake. Which is which? http://bit.ly/bS4rf vs http://bit.ly/pUZov
  231. Mikko H. Hypponenmikkohypponen COMPETWITION! Free geek laptop stickers to 25 people who re-tweet this message - picked randomly. http://bit.ly/Sticker - RT @mikkohypponen
  232. Mikko H. Hypponenmikkohypponen "U.S cyberwar capabilities focus on getting into Chinese computers with less secure OS, like those made by Microsoft." http://bit.ly/ugVIA
  233. Mikko H. Hypponenmikkohypponen We're still monitoring new "Swine flu" domains...but they are getting just ridiculous. Like igaveyourmomswineflu.com. Give me a break...
  234. Mikko H. Hypponenmikkohypponen l337 Beta Testers Needed: http://bit.ly/UXcnC
  235. Mikko H. Hypponenmikkohypponen Finland to join cyber-defence effort of NATO http://bit.ly/oqjmE via @InfowarMonitor
  236. Mikko H. Hypponenmikkohypponen Re-tweeting for those who missed this during the weekend: What did the online crime forum Darkmarket *really* look like? http://bit.ly/qI4Bq
  237. Mikko H. Hypponenmikkohypponen Hacked Virginia health agency was among the last to receive security patches; they were scheduled to the end of 2009: http://bit.ly/iIPX1
  238. Mikko H. Hypponenmikkohypponen Agent Mularski's interview from January 2009: http://bit.ly/Z2heS - via @bobmcmillan
  239. Mikko H. Hypponenmikkohypponen MyBazaar.ws logo changed to "Darkmarket". Mass paranoia on the forum. See: http://twitpic.com/4upcx/full and http://twitpic.com/4upe8/full
  240. Mikko H. Hypponenmikkohypponen Amazingly, crime forum Darkmarket is back, sort of. On Tuesday, the old Darkmarket.ws domain started redirecting to forum MyBazaar.ws.
  241. Mikko H. Hypponenmikkohypponen What did the online crime forum Darkmarket *really* look like when it was still operational? http://bit.ly/qI4Bq
  242. Mikko H. Hypponenmikkohypponen Fun FAQ at Comodo about their consumer VPN product. Read the question starting "I'm a cyber criminal myself": http://bit.ly/PtHVF
  243. Mikko H. Hypponenmikkohypponen http://Just.testing.what.ha...
  244. Mikko H. Hypponenmikkohypponen Our IT guys happened to run across this web page. That guy in the upper row sure looks like me. What are the odds? http://bit.ly/10x0GK
  245. Mikko H. Hypponenmikkohypponen Q&A on Windows 7 File Extension Hiding: http://bit.ly/eluc0 - re-reading it gives me a chuckle even though I wrote it myself...
  246. Mikko H. Hypponenmikkohypponen And for the backstory on the Stakkato case, here's some news: http://bit.ly/zQr70
  247. Mikko H. Hypponenmikkohypponen Hey @imaguid, the Stakkato link in my previous Tweet *was* the right one. Look down on the page. I didn't want to link to a PDF directly.
  248. Mikko H. Hypponenmikkohypponen Plenty of buzz on the indictment of Philip Petterson aka Stakkato. Original story on how he was located here: http://www.nsc.liu.se/~nixon/
  249. Mikko H. Hypponenmikkohypponen Here: http://twitpic.com/4pkmj - http://twitpic.com/4pkmn - http://twitpic.com/4pkn3 - http://twitpic.com/4pknu - http://twitpic.com/4pko1
  250. Mikko H. Hypponenmikkohypponen Found a series of interesting pictures from the net.
  251. Mikko H. Hypponenmikkohypponen Lots of buzz about the Virginia ransom case: http://bit.ly/yJieQ - sometimes guys like these get caught. Here's a pic: http://bit.ly/19yKTo
  252. Mikko H. Hypponenmikkohypponen To edit any web page, type this to address bar: javascript:document.body.contentEditable='true'; document.designMode='on'; void 42
  253. Mikko H. Hypponenmikkohypponen Here's something we don't see every day: a Mac email worm (which barely works though). Our description at: http://bit.ly/123SnO
  254. Mikko H. Hypponenmikkohypponen Windows 7 FAIL: http://bit.ly/Nq1pK
  255. Mikko H. Hypponenmikkohypponen "North Korea has strenghtened its cyber warfare unit...to launch attacks on South Korea and USA": http://bit.ly/1qVnR Via @arbornetworks
  256. Mikko H. Hypponenmikkohypponen Longest Tweet ever: ₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧₧!
  257. Mikko H. Hypponenmikkohypponen "We controlled the Torpig botnet for 10 days and collected 8GB of logs, 8310 bank logins and 1660 credit cards": http://bit.ly/cJ41W
  258. Mikko H. Hypponenmikkohypponen Fresh list of Swine Flu domains here: http://bit.ly/da8hL - My favourites: getswineflu.com and zombieswineflu.com. #swineflu
  259. Mikko H. Hypponenmikkohypponen Great post on the Loveletter worm anniversary by @gcluley: http://tr.im/koZX - I didn't know they are making a movie on it!
  260. Mikko H. Hypponenmikkohypponen The ‘close doors’ button on most lifts does not actually work. http://bit.ly/u7Er0
  261. Mikko H. Hypponenmikkohypponen In fact, Mebroot might be the most advanced malware we've seen, ever.
  262. Mikko H. Hypponenmikkohypponen Fascinating. Latest version of the Mebroot MBR rootkit uses Twitter to calculate C&C domains: http://bit.ly/EvDrJ
  263. Mikko H. Hypponenmikkohypponen John Markoff writes in NY Times: "USA might respond to a cyberattack with the military use of nuclear weapons". Wow. http://bit.ly/8t0Ni
  264. Mikko H. Hypponenmikkohypponen xkcd ends up on FBI watch list. Happy May Day everybody. http://bit.ly/Vgdb7
  265. Mikko H. Hypponenmikkohypponen Before you ask..."K5" comes from "Kooperatiivse KüberKaitse KompetentsiKeskus" == Cooperative Cyber Defence Competence Centre
  266. Mikko H. Hypponenmikkohypponen Found this PDF published by NATO K5 (CCD COE): http://bit.ly/Ip7I9 (PDF). Good stuff on Georgia DDoS 2008. Via http://bit.ly/2lPDag
  267. Mikko H. Hypponenmikkohypponen Located some fresh live examples of documents that have been used in targeted attacks: http://bit.ly/11jyEc
  268. Mikko H. Hypponenmikkohypponen PGP Corp (they create codes) forces Elcomsoft (they crack codes) to take down exhibition booth posters: http://bit.ly/jcvR0
  269. Mikko H. Hypponenmikkohypponen And by the way, I don't recommend running Firefox either...
  270. Mikko H. Hypponenmikkohypponen In case you're running Firefox, here are the essential Firefox Plugins for the Infosec Professional (by @danielrm26): http://bit.ly/59cgF
  271. Mikko H. Hypponenmikkohypponen Windows 7 will NOT show Autorun/Autoplay dialog for USB drives. Great news via @cjkuomsft
  272. Mikko H. Hypponenmikkohypponen Just blogged about my day in the Critical Infrastructure conference in Estonia: http://bit.ly/1pVNr #ciip
  273. Mikko H. Hypponenmikkohypponen It was refreshing to listen to President of Estonia speak. He knew his stuff. Discussed DNS problems, botnets, DDoS. Impressive. #ciip
  274. Mikko H. Hypponenmikkohypponen My blog post from two years ago to the day: http://tinyurl.com/cpvbzq
  275. Mikko H. Hypponenmikkohypponen It's the 2nd anniversary of the Estonia DDoS attacks. I'm right now in Tallinn, listening Estonian President at http://www.tallinnciip.eu
  276. Mikko H. Hypponenmikkohypponen Captcha me if you can: https://www.f-secure.com/web...
  277. Mikko H. Hypponenmikkohypponen Cool stuff by Mr. Leder and Werner: "We have created a little video that displays the functions inside Conficker" http://bit.ly/7qBaS
  278. Mikko H. Hypponenmikkohypponen Call for Papers is open for the T2 conference. T2 in late October in Helsinki, Finland: http://www.t2.fi/ - Word.
  279. Mikko H. Hypponenmikkohypponen A list of all the "swine flu" domains registered over the weekend is available via this blog post: http://bit.ly/da8hL
  280. Mikko H. Hypponenmikkohypponen I haven't found any malware from the swine flu domains yet, but I wouldn't recommend randomly googling for them and clicking the links...
  281. Mikko H. Hypponenmikkohypponen Samples: myswineflu.com, noswineflu.com, pandemicswineflu.com, swine-flu-masks.com, swineflucure.com, swineflupanic.com, swineflushots.com..
  282. Mikko H. Hypponenmikkohypponen I can see about 140 new .com domains registered over the weekend with the words "swine" and "flu" in their name...
  283. Mikko H. Hypponenmikkohypponen Anybody want to guess how long will it take until somebody writes a computer virus and calls it "H1N1" or "Swine Flu"?
  284. Mikko H. Hypponenmikkohypponen I will not recommend a specific replacement for Adobe Reader. I suggest you won't either, @bonezrodriguez. We need people to diverse more.
  285. Mikko H. Hypponenmikkohypponen Got several questions about the T-Shirt: http://bit.ly/pLAEJ ...yes, it's from Donkey Kong arcade coin-op. Copyright Nintendo 1981.
  286. Mikko H. Hypponenmikkohypponen Apparently Google does NOT see Captcha-cracking as a problem. At least they support Sponsored Ads about it: http://bit.ly/9SHT5
  287. Mikko H. Hypponenmikkohypponen Full story behind the company called "';UPDATE TAXRATE SET RATE = 0 WHERE NAME = 'EDVIN SYSE'" : http://bit.ly/aox1n
  288. Mikko H. Hypponenmikkohypponen I just noticed by chance that domain "lin.us" expired *yesterday* and is soon available for registration. Hmmm. http://whois.sc/lin.us
  289. Mikko H. Hypponenmikkohypponen Fascinating Marblecake hack: http://bit.ly/GOS5M (via @TEDchris)
  290. Mikko H. Hypponenmikkohypponen A guy called Edvin Syse set up a new company in Norway. Check out the company's name: http://bit.ly/KqNlB
  291. Mikko H. Hypponenmikkohypponen I will not recommend a specific PDF reader. I suggest you won't either, @SecurityGarden. It would be great to get people to diverse a bit.
  292. Mikko H. Hypponenmikkohypponen No, I don't like Adobe Reader. I don't like Foxit either. Thanks for asking @thiagoolmarques.
  293. Mikko H. Hypponenmikkohypponen Hey @paperghost - you've made it. Front page of Reddit. Top of the world! http://bit.ly/mNEGP Good photo too.
  294. Mikko H. Hypponenmikkohypponen To @JimmyPiver and others who have asked about a good replacement for Adobe Reader: Just pick any other reader. We need more variety.
  295. Mikko H. Hypponenmikkohypponen I see that the only thing that picked media interest in today's media brief by me and @PatrikRunald was the Adobe quote: http://bit.ly/THtXb
  296. Mikko H. Hypponenmikkohypponen More on the $25,000 phones from our blog: http://bit.ly/q5DrE
  297. Mikko H. Hypponenmikkohypponen "Should we avoid detecting hacking software used by governments...of which country? Germany? USA? Israel? Egypt? Iran?" http://bit.ly/splAd
  298. Mikko H. Hypponenmikkohypponen Trying to make sense of a story on how criminals are allegedly paying $25,000 for old "hackable" Nokia 1100 phones: http://bit.ly/4dnko
  299. Mikko H. Hypponenmikkohypponen It's the RSA Conference week. I'm expecting massive, important security technology announcements from all the vendors. Just kidding.
  300. Mikko H. Hypponenmikkohypponen New materials for our "Malware Analysis & Antivirus Technologies" university course are now available online: http://bit.ly/h1rQy
  301. Mikko H. Hypponenmikkohypponen Hey, since when has Twitter automatically converted "normal" links to Tinyurls? My previous tweet should have pointed to f-secure.com...
  302. Mikko H. Hypponenmikkohypponen My blog post on "Mikey and the Mysterious Treqz": http://tinyurl.com/da4g8q
  303. Mikko H. Hypponenmikkohypponen Added the list of messages the "Womp" Mikeyy worm sends to the end of this blog post: http://bit.ly/q7lnf
  304. Mikko H. Hypponenmikkohypponen Yes, another new Twitter worm. Example msg: "Be nice to your kids. They'll choose your nursing home. Womp. mikeyy."
  305. Mikko H. Hypponenmikkohypponen Yet another Twitter worm last night. More info & screenshots: http://bit.ly/q7lnf
  306. Mikko H. Hypponenmikkohypponen Passport numbers and social security numbers of 200 EU leaders and ministers leaked via a public terminal in a hotel: http://bit.ly/J7Hil
  307. Mikko H. Hypponenmikkohypponen About Federal Trojans: "...the FBI sneaks the trojan onto suspects machine using browser vulnerabilities...": http://bit.ly/jx1Z8
  308. Mikko H. Hypponenmikkohypponen Pirate Bay admins sentenced to a year in prison. They will appeal to higher court.
  309. Mikko H. Hypponenmikkohypponen Some buzz about Nokia phones sending your email passwords to nokia.com: http://bit.ly/JvQsn
  310. Mikko H. Hypponenmikkohypponen Rogue AV vendors try to make F-Secure look like another rogue via Google Ads. "Fix F-Secure Errors"? Give me a break. http://bit.ly/da8hL
  311. Mikko H. Hypponenmikkohypponen People actually *do* fall for these fake / rogue security products, and buy them. And then ask for support: http://bit.ly/jUS24
  312. Mikko H. Hypponenmikkohypponen Help us solve the Waledac domains mystery. http://bit.ly/LQpSI
  313. Mikko H. Hypponenmikkohypponen Black Hat Europe is underway. I'm not there, and I'm finding *no* info on what's going on from news, blogs or Twitter.
  314. Mikko H. Hypponenmikkohypponen Against traditional wisdom, most data breaches are *NOT* done by insiders. I totally agree. See http://bit.ly/rsvPO (PDF from Verizon)
  315. Mikko H. Hypponenmikkohypponen We keep seeing new variants of Exploit.MSPPoint.Apptom - infected PowerPoint files. Too bad Microsoft did not patch CVE-2009-0556 yesterday!
  316. Mikko H. Hypponenmikkohypponen While talking about Adobe, the amount of attacks against Adobe Flash are also going up. Adobe plugin is your browser's worst friend?
  317. Mikko H. Hypponenmikkohypponen My quote about getting rid of Adobe Reader: http://bit.ly/cV2gd - "There are alternatives, and they are all faster, smaller and more secure"
  318. Mikko H. Hypponenmikkohypponen Example on how easy Mikeyy Mooney is to find on the net. Here he is, playing guitar on Youtube: http://tinyurl.com/db6cj8
  319. Mikko H. Hypponenmikkohypponen Apparently the "Mikeyy" confessions have now been confirmed to really come from the right Mr. Mooney. AP story: http://bit.ly/1KSgrL
  320. Mikko H. Hypponenmikkohypponen For quite a while I was considering that Michael Mooney was being framed as the Mikeyy worm author as it was just way too easy to find him.
  321. Mikko H. Hypponenmikkohypponen Vmyths is, once again, right on the money. Cheers to Rob. http://vmyths.com/2009/04/1...
  322. Mikko H. Hypponenmikkohypponen I just updated my latest blog post with infection statistics on one of the Mikeyy worm variants. https://www.f-secure.com/web...
  323. Mikko H. Hypponenmikkohypponen Summary of the latest Mikeyy Twitter worm - info about who started it and, perhaps, who Mikeyy really is: https://www.f-secure.com/web...
  324. Mikko H. Hypponenmikkohypponen Yet another Twitter worm run. This apparently started just moments ago by user "cleaningUpMikey". Don't visit his profile.
  325. Mikko H. Hypponenmikkohypponen Twitter admins on Worms 10 minutes ago: "We are continuing to work towards shutting down any remaining strands of this latest attack." @spam
  326. Mikko H. Hypponenmikkohypponen Basic info on current Twitter worms from our blog: http://bit.ly/3xozo #stalkdaily #mikeyy #onedegree #worms
  327. Mikko H. Hypponenmikkohypponen I guess there's going to be quite a few Twitter worms for a day or two. Be careful, don't view profiles, don't follow links. Go outside?
  328. Mikko H. Hypponenmikkohypponen Latest on Stalkdaily worm from Twitter Status page: http://status.twitter.com/
  329. Mikko H. Hypponenmikkohypponen Just woke up and learned about XSS Twitter worm last night. You can see from here how it started. Don't click links. http://bit.ly/1V34d
  330. Mikko H. Hypponenmikkohypponen I am going to get a large print and frame this motivational poster: http://www.north5.demon.co....
  331. Mikko H. Hypponenmikkohypponen Just saw *yet* another drive-by-download. The actual exploit, once again, is done via a small PDF file. People, get rid of Adobe Reader!
  332. Mikko H. Hypponenmikkohypponen Previous Conficker blocked access to f-secure.com. So we advertised fsecure.com as a replacement. New Conficker blocks that too. Damn.
  333. Mikko H. Hypponenmikkohypponen You can buy *anything* online today. http://bit.ly/DyoN
  334. Mikko H. Hypponenmikkohypponen Updated my blog post on spying via XLS files - they *again* changed the IP address of the control server. http://bit.ly/LABH
  335. Mikko H. Hypponenmikkohypponen Here's an example of what the IP address for "www.army.mil" looks like in the Domaintools IP Explorer: http://bit.ly/1iH1h8
  336. Mikko H. Hypponenmikkohypponen Domaintools has released a fascinating graphical "IP Explorer" - you can see the whole IPv4 space in one screen. http://bit.ly/n1Wu
  337. Mikko H. Hypponenmikkohypponen Electronic voting results in three Finnish municipalities declared invalid; new (traditional) elections ordered. http://bit.ly/3iyDpV
  338. Mikko H. Hypponenmikkohypponen The spy server at "feng.pc-officer.com" suddenly became alive. I've updated my blog post from yesterday: http://bit.ly/LABH
  339. Mikko H. Hypponenmikkohypponen Here's a typical webforum taken over by carders, selling stolen credit cards. Scroll down to find a guy selling AK-47s! http://bit.ly/2ljx9h
  340. Mikko H. Hypponenmikkohypponen I had no idea you could get a "World of Warcraft" VISA credit card. http://www.worldofwarcraft.... - next up, GTA cards?
  341. Mikko H. Hypponenmikkohypponen Computer Security Threat Summary for Q1/2009 has been published: http://bit.ly/41ShoR
  342. Mikko H. Hypponenmikkohypponen Looked at another targeted spying attack. This malware sends stolen data to weloveusa.3322.org. Which has address 61.51.179.192. In Beijing.
  343. Mikko H. Hypponenmikkohypponen Hey, Norwegians! You _really_ should get a web server at this address. What a cool IP. Ping it. http://whois.domaintools.co...
  344. Mikko H. Hypponenmikkohypponen Twitterholic says I'm Huge in Helsinki! Thanks to all the followers. http://twitterholic.com/top...
  345. Mikko H. Hypponenmikkohypponen Recent example of online espionage. This was done via an Excel XLS document file: http://bit.ly/LABH #Ghostnet
  346. Mikko H. Hypponenmikkohypponen Are URL Shorteners A Necessary Evil, Or Just Evil? http://bit.ly/prx7z via@samikki
  347. Mikko H. Hypponenmikkohypponen Pretty pictures about Bluetooth and MMS viruses: http://bit.ly/3zIeIT
  348. Mikko H. Hypponenmikkohypponen Anybody can request GMail to send you a password reminder to your "alternative" address and GMail will show the domain of that address.
  349. Mikko H. Hypponenmikkohypponen More about email security: if you're setting up an "anonymous" GMail address, do not leave an alternative email address there during setup.
  350. Mikko H. Hypponenmikkohypponen XKCD on Email Security Questions: http://xkcd.com/565/
  351. Mikko H. Hypponenmikkohypponen Hey, my boast on *free beer* made this list: http://www.networkworld.com...
  352. Mikko H. Hypponenmikkohypponen Our University course material on Malware analysis for year 2009 is online as well: https://noppa.tkk.fi/noppa/...
  353. Mikko H. Hypponenmikkohypponen RT @thierryzoller Highly recommended : F-Secure university course (includes AV engine design) http://www.tml.tkk.fi/Opinn...
  354. Mikko H. Hypponenmikkohypponen National Public Radio feature on Ghostnet http://bit.ly/2zx6, direct link to MP3: http://www.bu.edu/wbur/stor...
  355. Mikko H. Hypponenmikkohypponen Earlier today I bet a case of beer that the Belarus Conficker arrests were a joke. Just got confirmation it was. Hello to a case of Becks.
  356. Mikko H. Hypponenmikkohypponen Heise magazine republishing Joe Stewart's Conficker test here: http://bit.ly/ybzXK
  357. Mikko H. Hypponenmikkohypponen Conficker authors arrested? In Belarus? Maybe? Maybe not. http://bit.ly/9RQ2
  358. Mikko H. Hypponenmikkohypponen Been there, done that, got the t-shirt... http://bit.ly/10Y2n
  359. Mikko H. Hypponenmikkohypponen Where in the world are all the Conficker-infected machines? Conficker Working Group has the maps: http://bit.ly/12vAOB Kudos to Shadowserver
  360. Mikko H. Hypponenmikkohypponen Joe Stewart is so clever. This is the most visual way to tell if you're infected by Conficker: http://www.joestewart.org/c...
  361. Mikko H. Hypponenmikkohypponen Brian Krebs takes a piece of the #Conficker action. Read the whole piece. http://bit.ly/Sr6GM
  362. Mikko H. Hypponenmikkohypponen Our take on #Conficker and April Fools Jokes: http://bit.ly/MmuU
  363. Mikko H. Hypponenmikkohypponen Plenty of #Conficker-related April fools jokes going around in news and blogs. For the record: Our blog won't have jokes this year.
  364. Mikko H. Hypponenmikkohypponen So far, so good. #Conficker is active but it's not doing anything. Apparently today is not the day.
  365. Mikko H. Hypponenmikkohypponen #Conficker's April 1st routine has activated, but nothing is happening. RT our Q&A: http://bit.ly/SRJ59
  366. Mikko H. Hypponenmikkohypponen #Conficker coverage. Here's a video of a duo speech I did together with Patrik Runald last month: http://bit.ly/12sNAE
  367. Mikko H. Hypponenmikkohypponen So, when *exactly* does April 1st start for #Conficker? Here's the answer: http://bit.ly/awnRg
  368. Mikko H. Hypponenmikkohypponen It's Conficker Day! Great new report on the worm from Felix Leder and Tillmann Werner / Honeynet Project: http://bit.ly/jC7Sp
  369. Mikko H. Hypponenmikkohypponen Easy way to do a vulnerability scan to find Conficker-infected hosts; see http://doxpara.com/ ... via @dakami and Conficker Working Group
  370. Mikko H. Hypponenmikkohypponen CNN's interview with Chinese hackers 2008. Quote: "After the attack, they were paid by chinese government". http://bit.ly/12AAfv #ghostnet
  371. Mikko H. Hypponenmikkohypponen #Ghostnet was done with backdoors "Gh0st RAT" and "Poison Ivy". These guys made them: http://www.wolfexp.net - http://www.poisonivy-rat.com
  372. Mikko H. Hypponenmikkohypponen The China Daily responds to allegations on #Ghostnet: http://tinyurl.com/cfpnh2 - via @InfowarMonitor.
  373. Mikko H. Hypponenmikkohypponen The infowar-monitor.net site is *still* down for unknown reasons. Hmm. #ghostnet spying network info available at http://bit.ly/ASGPe
  374. Mikko H. Hypponenmikkohypponen More background and concrete examples on Ghostnet attack in my blog post: http://bit.ly/ASGPe #ghostnet
  375. Mikko H. Hypponenmikkohypponen More about targeted attacks; here's two Youtube videos explaining how they work: http://bit.ly/UGLpg and http://bit.ly/rco7 #ghostnet
  376. Mikko H. Hypponenmikkohypponen Another new research paper related to #ghostnet, from University of Cambridge: http://bit.ly/TVQlY
  377. Mikko H. Hypponenmikkohypponen #Ghostnet paper is inaccessible as http://www.infowar-monitor.net is down, for reason or another. We have a mirror up at http://bit.ly/zqdjy
  378. Mikko H. Hypponenmikkohypponen Major news breaking about the targeted malware spying attacks around the world (dupped #ghostnet). Great research done by Greg Walton & co.
  379. Mikko H. Hypponenmikkohypponen The Register: "Leaked memo says Conficker pwns Parliament" - http://bit.ly/UCPEi
  380. Mikko H. Hypponenmikkohypponen Yes, it's really hard to get SSL certificates right. Even RSA has problems. Try visiting https://www.rsaconference.com/
  381. Mikko H. Hypponenmikkohypponen Here's our April 1st / Conficker questions & answers: http://bit.ly/SRJ59
  382. Mikko H. Hypponenmikkohypponen http://twitpic.com/2gd42 - This is what the "bettersale" contacts looked like on my account.
  383. Mikko H. Hypponenmikkohypponen Is anyone else getting Gmail contact spam with the label "bettersale"?
  384. Mikko H. Hypponenmikkohypponen Fascinating service that cracks CAPTCHAs for money: http://bit.ly/1eJr1g - how do they do it? Like this: http://bit.ly/RcxvV
  385. Mikko H. Hypponenmikkohypponen Debugging poor wi-fi reception? Here's a neat tool for Win32. Walk around and it draws a map of reception levels. http://tinyurl.com/dllt3v
  386. Mikko H. Hypponenmikkohypponen Here's another easy-to-remember URL for a live website when DNS doesn't work: http://222.222.22.22/ - but I still prefer http://12.34.56.7/
  387. Mikko H. Hypponenmikkohypponen If DNS ever breaks, the only accessible website is Southern Air Inc's. Why? Because you will remember their address: http://12.34.56.7/
  388. Mikko H. Hypponenmikkohypponen Psyb0t DSL worm irc channel topic is now: "Research is over: for those interested i reached 80K. That was fun". http://tinyurl.com/chln6n
  389. Mikko H. Hypponenmikkohypponen In case you haven't seen this one yet...Mr. Robert Dutu is a honest scammer: http://preview.tinyurl.com/...
  390. Mikko H. Hypponenmikkohypponen TOP 10 IT locations according to the Australians: Boston, Romania, Fort Meade, Finland, Zhongguancun...: http://preview.tinyurl.com/...
  391. Mikko H. Hypponenmikkohypponen A bot called "psyb0t" is going around: this one doesn't infect computers at all. Targets DSL modems instead. See http://tinyurl.com/chln6n
  392. Mikko H. Hypponenmikkohypponen Pictures of trafficconverter.net front page yesterday and today: http://tinyurl.com/c8krnx
  393. Mikko H. Hypponenmikkohypponen Breaking news: trafficconverter2.biz (and trafficconverter.net) going down.
  394. Mikko H. Hypponenmikkohypponen SRI's excellent deep analysis on Downadup/Conficker.C has been made public: http://mtc.sri.com/Conficke...
  395. Mikko H. Hypponenmikkohypponen Just spotted some malicious Youtube emails talking about "Skinny Guy Eats 53 Hot Dogs". Uses Java to infect. See http://tinyurl.com/c9axah
  396. Mikko H. Hypponenmikkohypponen Why are Rogue security programs so common? Because they are being pushed by organized criminal gangs like http://trafficconverter2.biz
  397. Mikko H. Hypponenmikkohypponen Talking about Germany: we're looking for the 10 most important viruses of the last 10 years for our German office: http://tinyurl.com/c9j7k7
  398. Mikko H. Hypponenmikkohypponen German is a great language. With words like "angstschweiß" ("cold sweat"). Look again: n, g, s, t, s, c, h, w...it has EIGHT consonants!
  399. Mikko H. Hypponenmikkohypponen Nashi claims responsibility for Estonian DDoS attacks. Ridiciluous. Next they take blame for credit crunch as they didn't pay their bills.
  400. Mikko H. Hypponenmikkohypponen Hey, Collin Mulliner just started following me (hi!). Do check out Collin's excellent Symbian slides from 25C3: http://tinyurl.com/bevofj
  401. Mikko H. Hypponenmikkohypponen It's PDF patching day. Get your patch for Foxit: http://preview.tinyurl.com/... and Adobe Reader: http://preview.tinyurl.com/...
  402. Mikko H. Hypponenmikkohypponen VB mag posted Peter Ferrie's excellent article on Win32.Divinorum: http://tinyurl.com/c3hdne. This virus recommends me to cut my hair.
  403. Mikko H. Hypponenmikkohypponen Apparently the PIFTS.EXE t-shirts are made by the guys running http://piftsexe.com/
  404. Mikko H. Hypponenmikkohypponen With all this talk about Symantec and PIFTS.EXE, obviously somebody is already making t-shirts about it: http://www.zazzle.com/piftsexe
  405. Mikko H. Hypponenmikkohypponen Cheer up your office with delightful posters from our Counter-Intelligence friends: http://tinyurl.com/dlcsk and http://tinyurl.com/cz7szv
  406. Mikko H. Hypponenmikkohypponen Five days left in the call for papers for the summer conference in NATO's Cyber Defense Center (Estonia). http://preview.tinyurl.com/...
  407. Mikko H. Hypponenmikkohypponen Ever wanted to see the kitchen of an online criminal? I give you crazyfranky2002 from Sevlievo, Bulgaria: http://tinyurl.com/bcumqd
  408. Mikko H. Hypponenmikkohypponen Hacking the iPhone talk from 25c3: http://tinyurl.com/c9dyxf
  409. Mikko H. Hypponenmikkohypponen Back from parliament. You would think they would offer lunch for outsiders but they don't. And now it's snowing even harder.
  410. Mikko H. Hypponenmikkohypponen On my way to the house of parliament. I'm glad I brought a tie.
  411. Mikko H. Hypponenmikkohypponen Snowing hard in Helsinki.
  412. Mikko H. Hypponenmikkohypponen I decided to reserve http://twitter.com/mikkohyp... as well. Old account at http://twitter.com/hypponen. Cheers.