logo
CyberVision
logo
  • Home
  • About
  • Solutions
    • WithSecure Corporate
    • F-Secure Consumer
  • Resources
    • Articles
    • Cybervision Humour
    • eBooks
    • Glossary of Terms
    • ID Theft Checker
    • Infographics
    • Local Threats
    • Useful links
    • Useful online security tips
    • Videos
    • Webinars
    • Whitepapers
  • Press
    • Newsletters
      • Cyber Security Bulletin
      • Cybervision Partner Newsletter
    • Local News
    • International News
  • Threats
  • POPIA
    • FAQ’s
    • Use RADAR to help comply
  • Contact
  • Blog
Business Security
11th May 2018 by CyberVision 0 Comments 1787 Views
11th May 2018 by CyberVision in Business Security

Mikko Hypponen: Three types of online attacks

Online Attacks

Mikko Hyppönen is a global security expert and the resident Chief Research Officer at F-Secure. He is also the keynote speaker at the upcoming ITWeb Security Summit in Johannesburg on 22nd May. Mikko’s insight on how we can stop new viruses from threatening our online safety is different from the rest. His ability to make complex technical concepts easy to understand, separating fact from hearsay, and his detailed storytelling earn him the title of being the most influential worldwide authority on computer security.

According to Mikko, there are three types of online attacks. These attacks would be that from malicious hackers, hackers who are referred to as “hacktivists” who protest or rebel against the system, and surprisingly enough, your own government. Going through this list might not invoke a sense of worry, but don’t be fooled.

 

  • Malicious Hackers

Financial gain is what motivates hackers most often. Hackers, like anyone motivated by money, want the most amount of return they can get for the amount of effort they put in. One would think that a small business is not at risk to such attacks, but this is not true.

Targeting small businesses or industries that have lax security rules can result in a successful attack without much work for the hacker. In fact, it can be more lucrative for a hacker to target multiple small businesses than to target a larger company such as a bank, given the difference in security measures for these two types of companies.

  • Hacktivists

The fight for freedom of expression, the defence of human rights, the total unwillingness to any form of surveillance and control, and the reporting of abuse by regimes are the main arguments that motivate groups of hacktivists to action.

Extracting files and giving them to WikiLeaks does hurt governments. However, putting user names and passwords on a pastebin doesn’t affect governments, but posting this kind of information about the people they claim to fight for is just wrong.

  • Government organisations

When it comes to protecting sensitive data, government agencies store highly sensitive data that could be lucrative in the hands of criminals. It’s hard to know how long law enforcement agencies have been hacking citizens as part of their investigations and even harder to know exactly what tools they’ve been using. But they are definitely using them.

 

One could argue that hacking can be used for good. But with that, comes another set of risks. If hacking is used for ethical reasons, it will definitely be used for criminal reasons too. Our privacy is a human right that should not be ignored with the progress that has been made in recent times. As said by Mikko: “It is not a question between privacy versus security, but rather freedom versus control”.

 

 

0
Recommend
  • Facebook
  • Twitter
  • LinkedIN
  • Pinterest
Share
  • f-secure
  • f-secure cyber security
  • Meet Mikko
  • Mikko Hypponen
  • Month of Mikko
  • online attacks
Tagged in

Categories

  • Business
  • Business Security
  • F-Secure
  • F-Secure Life
  • Home Security
  • IoT & Technology
  • Online Marketing
  • Real life
  • Tech
  • Threats & Research

Recent Posts

  • F-Secure rises to 3rd Most Attractive Company for IT Students
  • F-Secure R&D discovers exploitable vulnerability in Apple’s macOS Gatekeeper
  • VMware vulnerability puts even more pressure on organizations relying on remote work
  • The cyber security risks of working from home
  • If your company data is breached, should you pay a ransom?

Archives

  • May 2021
  • April 2021
  • December 2020
  • April 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • March 2015
  • February 2015

© CyberVision PTY Ltd | 2025 | All Rights Reserved.

View our Privacy Policy and Terms of Service.

logo