Markus Jakobsson | |
---|---|
Alma mater | University of California, San Diego |
Occupation(s) | Computer Security Researcher, Entrepreneur, Writer |
Scientific career | |
Thesis | Privacy vs. authenticity (1997) |
Doctoral advisor | Russell Impagliazzo |
Website | www |
Markus Jakobsson is a computer security researcher, entrepreneur and writer, whose work is focused on the issue of digital security.
Markus Jakobsson is currently chief scientist at Artema Labs, a company with the mission of disrupting and improving the crypto and NFT markets. Prior to his current role, he has been chief scientist at ByteDance; chief of security and data analytics at Amber Solutions, and chief scientist at Agari.
Prior to that, he was a senior director at Qualcomm as a result of Qualcomm acquiring FatSkunk in 2014; Jakobsson founded FatSkunk in 2009, and served as its CTO until the acquisition. Prior to his position at Qualcomm, Jakobsson has served as principal scientist of Consumer Security at PayPal, held positions as the principal scientist for Palo Alto Research Center and RSA Security, and served as vice president of the International Financial Cryptography Association. [1] [2] Prior to these positions, he was a member of the technical staff at Bell Labs, and held a position at Xerox PARC. [3] In addition, Jakobsson serves as an expert witness and is a member of the software and networking litigation group Harbor Labs. [4]
He has a background in higher education, having served as an associate professor at Indiana University where he was also a cybersecurity researcher and co-director of the Center for Applied Cybersecurity Research. [5] [6] He has also served as an adjunct associate professor at New York University. [7]
In, 2021, Jakobsson co-founded Artema Labs. In 2004, Jakobsson was one of the founders of the digital security company RavenWhite. [8] The Silicon Valley company offers device identification technologies and other authentication solutions for businesses that pair customer identity with digital privacy. [9] In 2006, he launched securitycartoon.com with Dr. Sukamol Srikwan. [10] A website using comics to teach security awareness and understanding among the average internet user, it became the basis for the company Extricatus, which developed Fastwords, an online password creation system where users create secure passwords made of a string of everyday words in order to make them easy to remember. [11] [12] In 2009, Jakobsson co-founded Fatskunk, a company that targets malware that attacks wireless devices such as tablets and smartphones. [13] He founded ZapFraud Inc in 2013. ZapFraud is an IP holding company with a portfolio related to targeted email attacks, including phishing and business email compromise. Markus has served on the advisory boards for Metaforic, a VC-backed company that markets software that other developers can incorporate into their own for greater security, and Lifelock, an identity protection company. [14] [15] In addition, he is a visiting research fellow of the Anti-Phishing Working Group (APWG), an organization focused on reducing cybercrime. [16]
Jakobsson holds a PhD in computer science from the University of California at San Diego, as well as master's degrees from both the University of California at San Diego and Lund University in Sweden. [17]
Jakobsson's early research publications were focused on cryptography. [18] Later research emphasis was aimed at understanding and preventing fraud. [19] [20] [21] With Filippo Menczer and two students, he also conducted live experiments on Internet users in order to determine the ways users were likely to fall victim to various forms on online fraud. [21] [22] His later research was focused toward mobile security and the detection of malware on mobile platforms. [23]
In a 1999 paper he, together with Ari Juels, coined the term "proof of work", a central concept in cryptocurrencies such as Bitcoin. [24]
He is the brother of Hampus Jakobsson, an investor and tech entrepreneur, and Andreas Jakobsson, a professor of mathematical statistics at Lund University. [25]
Jakobsson is the author or editor of a series of books and studies dealing with the world of internet security and its practical applications for businesses and individual users. [26]
This timeline of computer viruses and worms presents a chronological timeline of noteworthy computer viruses, computer worms, Trojan horses, similar malware, related research and events.
Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to observe everything while the victim navigates the site, and transverses any additional security boundaries with the victim. As of 2020, it is the most common type of cybercrime, with the FBI's Internet Crime Complaint Center reporting more incidents of phishing than any other type of cybercrime.
Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet is an inherently insecure channel for information exchange, with high risk of intrusion or fraud, such as phishing, online viruses, trojans, ransomware and worms.
Scareware is a form of malware which uses social engineering to cause shock, anxiety, or the perception of a threat in order to manipulate users into buying unwanted software. Scareware is part of a class of malicious software that includes rogue security software, ransomware and other scam software that tricks users into believing their computer is infected with a virus, then suggests that they download and pay for fake antivirus software to remove it. Usually the virus is fictional and the software is non-functional or malware itself. According to the Anti-Phishing Working Group, the number of scareware packages in circulation rose from 2,850 to 9,287 in the second half of 2008. In the first half of 2009, the APWG identified a 585% increase in scareware programs.
A security token is a peripheral device used to gain access to an electronically restricted resource. The token is used in addition to, or in place of, a password. Examples of security tokens include wireless key cards used to open locked doors, a banking token used as a digital authenticator for signing in to online banking, or signing transactions such as wire transfers.
Self-service password reset (SSPR) is defined as any process or technology that allows users who have either forgotten their password or triggered an intruder lockout to authenticate with an alternate factor, and repair their own problem, without calling the help desk. It is a common feature in identity management software and often bundled in the same software package as a password synchronization capability.
Crimeware is a class of malware designed specifically to automate cybercrime.
A transaction authentication number (TAN) is used by some online banking services as a form of single use one-time passwords (OTPs) to authorize financial transactions. TANs are a second layer of security above and beyond the traditional single-password authentication.
A password manager is a software program to prevent password fatigue by automatically generating, autofilling and storing passwords. It can do this for local applications or web applications such as online shops or social media. Web browsers tend to have a built-in password manager. Password managers typically require a user to create and remember a single password to unlock to access the stored passwords. Password managers can integrate multi-factor authentication.
Voice phishing, or vishing, is the use of telephony to conduct phishing attacks.
Internet safety, also known as online safety, cyber safety and electronic safety (e-safety), refers to the policies, practices and processes that reduce the harms to people that are enabled by the (mis)use of information technology.
Man-in-the-browser, a form of Internet threat related to man-in-the-middle (MITM), is a proxy Trojan horse that infects a web browser by taking advantage of vulnerabilities in browser security to modify web pages, modify transaction content or insert additional transactions, all in a covert fashion invisible to both the user and host web application. A MitB attack will be successful irrespective of whether security mechanisms such as SSL/PKI and/or two- or three-factor authentication solutions are in place. A MitB attack may be countered by using out-of-band transaction verification, although SMS verification can be defeated by man-in-the-mobile (MitMo) malware infection on the mobile phone. Trojans may be detected and removed by antivirus software, but a 2011 report concluded that additional measures on top of antivirus software were needed.
Kaspersky Lab is a Russian multinational cybersecurity and anti-virus provider headquartered in Moscow, Russia, and operated by a holding company in the United Kingdom. It was founded in 1997 by Eugene Kaspersky, Natalya Kaspersky and Alexey De-Monderik. Kaspersky Lab develops and sells antivirus, internet security, password management, endpoint security, and other cybersecurity products and services.
Multi-factor authentication is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence to an authentication mechanism. MFA protects personal data—which may include personal identification or financial assets—from being accessed by an unauthorized third party that may have been able to discover, for example, a single password.
Trusteer is a Boston-based computer security division of IBM, responsible for a suite of security software. Founded by Mickey Boodaei and Rakesh K. Loonkar, in Israel in 2006, Trusteer was acquired in September 2013 by IBM for $1 billion.
Avalanche was a criminal syndicate involved in phishing attacks, online bank fraud, and ransomware. The name also refers to the network of owned, rented, and compromised systems used to carry out that activity. Avalanche only infected computers running the Microsoft Windows operating system.
The following outline is provided as an overview of and topical guide to computer security:
The social media platform and social networking service Facebook has been affected multiple times over its history by intentionally harmful software. Known as malware, these pose particular challenges both to users of the platform as well as to the personnel of the tech-company itself. Fighting the entities that create these is a topic of ongoing malware analysis.
Internet security awareness or Cyber security awareness refers to how much end-users know about the cyber security threats their networks face, the risks they introduce and mitigating security best practices to guide their behavior. End users are considered the weakest link and the primary vulnerability within a network. Since end-users are a major vulnerability, technical means to improve security are not enough. Organizations could also seek to reduce the risk of the human element. This could be accomplished by providing security best practice guidance for end users' awareness of cyber security. Employees could be taught about common threats and how to avoid or mitigate them.