Markus Jakobsson

UNO DE LOS CIENTÍFICOS INFORMÁTICOS MÁS DESTACADOS DEL MUNDO SOBRE PREVENCIÓN DEL FRAUDE.

SECURITY RESEARCHER, BYTEDANCE. CHIEF SCIENTIST, AGARI (2016-18). INVESTIGADOR PRINCIPAL EN RSA LABS (2000-04).

Markus Jakobsson speaker, conferencias, privacy, security
Inglés

Markus Jakobsson es uno de los científicos informáticos más destacados del mundo que estudia la prevención del fraude. Ha realizado y publicado investigaciones novedosas sobre fraude y autenticación desde 1993, con un enfoque en la industria de pagos desde 1995. En 1999, postuló el término “Phising” que más tarde se convertiría en un gran problema.

El Dr. Jakobsson se ha desempeñado como testigo experto en una amplia gama de casos, que abarcan litigios de patentes, reexamen de patentes, certificación de demandas colectivas y casos penales. Ha representado tanto a demandantes como a demandados en casos relacionados con diversos aspectos de las telecomunicaciones, seguridad informática, privacidad y criptografía.

 

En 2004, Markus Jakobsson creó un grupo de investigación sobre el fraude online y las contramedidas, que dio como resultado más de 50 publicaciones y dos libros:

“Phishing and Countermeasures” y «Crimeware: Understanding New Attacks and Defenses».

 

Fue cofundador de la primera empresa que se ocupó de la educación en seguridad del consumidor y es pionero en esa área. También cofundó una empresa derivada de RSA Security (RavenWhite Security), una empresa para abordar el malware en el móvil (FatSkunk), y ha supervisado la creación de su propiedad intelectual. También fundó ZapFraud, una empresa que aborda el compromiso del correo electrónico comercial. Anteriormente, fue el Científico Jefe de Agari (2016-18), una empresa líder en ciberseguridad, en la que las empresas Fortune 500 confían para proteger a sus empresas, socios y clientes de los ataques avanzados de phishing por correo electrónico.

Actualmente, Markus Jakobsson es investigador de seguridad en ByteDance, una empresa de tecnología que opera en una variedad de plataformas de contenido que informan, educan, entretienen e inspiran a personas de diferentes idiomas, culturas y geografías.

Asimismo, ha reclutado y supervisado a desarrolladores y estudiantes de doctorado / maestría durante veinte años. Anteriormente, estuvo a cargo de la creación de grupos de investigación en Bell Laboratories, RSA Labs y en la Universidad de Indiana. Además fue contratado para Xerox PARC para proporcionar liderazgo intelectual a su grupo de seguridad.

 

Como científico principal de RSA Laboratories en 2001, su trabajo consistía en determinar el impacto de futuros escenarios de fraude en el comercio y la autenticación, y desarrollar la propiedad intelectual para abordar tales problemas.

 

Sus antiguos asesores tienen roles destacados en Mozilla, Google y las mejores universidades como MIT y ETH Zurich MIT. Además, desempeñó un papel destacado en la definición de los esfuerzos de propiedad intelectual en PayPal / eBay y contribuyó significativamente a la ampliación de su cartera de clientes.

Las investigaciones de Markus Jakobsson están centradas en la identificación de problemas de seguridad, tendencias y solución en cuatro ejes: computacional, estructural, físico y social; análisis de fraude cuantitativo y cualitativo y desarrollo de tecnologías de seguridad disruptivas.

Phishing y contramedidas.

Malware móvil.

Fraude.

Autenticacion de usuario.

ID de los dispositivos.

Diseño de Protocolos.

Intimidad / Privacidad

Interfaces de usuario.

Seguridad Móvil.

Pagos criptográficos.

Votos electorales por correo.

Security, Privacy and User Interaction.

This book makes the case that traditional security design does not take the end-user into consideration, and therefore, fails. This book goes on to explain, using a series of examples, how to rethink security solutions to take users into consideration. By understanding the limitations and habits of users – including malicious users, aiming to corrupt the system – this book Illustrates how better security technologies are made possible.

Traditional security books focus on one of the following areas: cryptography, security protocols, or existing standards. They rarely consider the end user as part of the security equation, and when they do, it is in passing. This book considers the end user as the most important design consideration, and then shows how to build security and privacy technologies that are both secure and which offer privacy. This reduces the risk for social engineering and, in general, abuse.

Advanced-level students interested in software engineering, security and HCI (Human Computer Interaction) will find this book useful as a study guide. Engineers and security practitioners concerned with abuse and fraud will also benefit from the methodologies and techniques in this book.

Security, Privacy and User Interaction.

Understanding Social Engineering Based Scams.

This book describes trends in email scams and offers tools and techniques to identify such trends. It also describes automated countermeasures based on an understanding of the type of persuasive methods used by scammers. It reviews both consumer-facing scams and enterprise scams, describing in-depth case studies relating to Craigslist scams and Business Email Compromise Scams. This book provides a good starting point for practitioners, decision makers and researchers in that it includes alternatives and complementary tools to the currently deployed email security tools, with a focus on understanding the metrics of scams. Both professionals working in security and advanced-level students interested in privacy or applications of computer science will find this book a useful reference.

Understanding Social Engineering Based Scams.

Mobile Authentication: Problems and Solutions.

Mobile Authentication: Problems and Solutions looks at human-to-machine authentication, with a keen focus on the mobile scenario. Human-to-machine authentication is a startlingly complex issue. In the old days of computer security-before 2000, the human component was all but disregarded. It was either assumed that people should and would be able to follow instructions, or that end users were hopeless and would always make mistakes. The truth, of course, is somewhere in between, which is exactly what makes this topic so enticing. We cannot make progress with human-to-machine authentication without understanding both humans and machines.

Mobile security is not simply security ported to a handset. Handsets have different constraints than traditional computers, and are used in a different way. Text entry is more frustrating, and therefore, it is tempting to use shorter and less complex passwords. It is also harder to detect spoofing. We need to design with this in mind. We also need to determine how exactly to integrate biometric readers to reap the maximum benefits from them. This book addresses all of these issues, and more.

Mobile Authentication: Problems and Solutions.

Crimeware: Understanding New Attacks and Defenses.

“This book is the most current and comprehensive analysis of the state of Internet security threats right now. The review of current issues and predictions about problems years away are critical for truly understanding crimeware. Every concerned person should have a copy and use it for reference.”

—Garth Bruen, Project KnujOn Designer

There’s a new breed of online predators—serious criminals intent on stealing big bucks and top-secret information—and their weapons of choice are a dangerous array of tools called “crimeware.” With an ever-growing number of companies, organizations, and individuals turning to the Internet to get things done, there’s an urgent need to understand and prevent these online threats.

Crimeware: Understanding New Attacks and Defenses will help security professionals, technical managers, students, and researchers understand and prevent specific crimeware threats. This book guides you through the essential security principles, techniques, and countermeasures to keep you one step ahead of the criminals, regardless of evolving technology and tactics. Security experts Markus Jakobsson and Zulfikar Ramzan have brought together chapter contributors who are among the best and the brightest in the security industry. Together, they will help you understand how crimeware works, how to identify it, and how to prevent future attacks before your company’s valuable information falls into the wrong hands. In self-contained chapters that go into varying degrees of depth, the book provides a thorough overview of crimeware, including not only concepts prevalent in the wild, but also ideas that so far have only been seen inside the laboratory.

With this book, you will

>Understand current and emerging security threats including rootkits, bot networks, spyware, adware, and click fraud
>Recognize the interaction between various crimeware threats
>Gain awareness of the social, political, and legal implications of these threats
>Learn valuable countermeasures to stop crimeware in its tracks, now and in the future
>Acquire insight into future security trends and threats, and create an effective defense plan

Crimeware: Understanding New Attacks and Defenses.