145:
In 2006, he launched securitycartoon.com with Dr. Sukamol
Srikwan. A website using comics to teach security awareness and understanding among the average internet user, it became the basis for the company Extricatus, which developed Fastwords, an online password creation system where users create secure passwords made of a string of everyday words in order to make them easy to remember. In 2009, Jakobsson co-founded Fatskunk, a company that targets malware that attacks wireless devices such as tablets and smartphones. He founded ZapFraud Inc in 2013. ZapFraud is an IP holding company with a portfolio related to targeted email attacks, including
122:
Markus
Jakobsson is currently Chief Scientist at Artema Labs, a company with the mission of disrupting and improving the crypto and NFT markets. Prior to his current role, he has been Chief Scientist at ByteDance; Chief of Security and Data Analytics at Amber Solutions, and Chief Scientist at Agari.
131:
and RSA Security, and served as vice president of the
International Financial Cryptography Association. Prior to these positions, he was a member of the Technical Staff at Bell Labs, and held a position at Xerox PARC. In addition, Jakobsson serves as an expert witness and is a member of the software
126:
Prior to that, he was a senior director at
Qualcomm as a result of Qualcomm acquiring FatSkunk in 2014; Jakobsson founded FatSkunk in 2009, and served as its CTO until the acquisition. Prior to his position at Qualcomm, Jakobsson has served as Principal Scientist of Consumer Security at PayPal, held
144:
In, 2021, Jakobsson co-founded Artema Labs. In 2004, Jakobsson was one of the founders of the digital security company RavenWhite. The
Silicon Valley company offers device identification technologies and other authentication solutions for businesses that pair customer identity with digital privacy.
135:
He has a background in higher education, having served as an associate professor at
Indiana University where he was also a cybersecurity researcher and co-director of the Center for Applied Cybersecurity Research. He has also served as an adjunct associate professor at New York University.
153:. Markus has served on the advisory boards for Metaforic, a VC-backed company that markets software that other developers can incorporate into their own for greater security, and Lifelock, an identity protection company. In addition, he is a visiting research fellow of the
197:
and two students, he also conducted live experiments on
Internet users in order to determine the ways users were likely to fall victim to various forms on online fraud. His later research was focused toward mobile security and the detection of malware on mobile platforms.
332:
647:
333:"Dr. Markus Jakobsson PayPal Principal Scientist Consumer Security, Past Principal Research Scientist RSA Security and PARC - Canadian IT Manager's Blog - Site Home - TechNet Blogs"
237:
Jakobsson is the author or editor of a series of books and studies dealing with the world of internet security and its practical applications for businesses and individual users.
404:
993:
968:
222:
408:
539:
254:
Towards
Trustworthy Elections: New Directions in Electronic Voting (Lecture Notes in Computer Science / Security and Cryptology)
256:, David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Editors, Springer, 2010
721:
170:
677:
EUROCRYPT'96: Proceedings of the 15th Annual
International Conference on Theory and Application of Cryptographic Techniques
513:
32:
114:
is a computer security researcher, entrepreneur and writer, whose work is focused on the issue of digital security.
973:
561:
998:
978:
353:
286:
154:
225:, an investor and tech entrepreneur, and Andreas Jakobsson, a professor of mathematical statistics at
150:
128:
698:
983:
669:
242:
Phishing and
Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft
988:
780:
856:
828:
202:
744:
311:
8:
174:
79:
927:
803:
717:
807:
708:. Lecture Notes in Computer Science. Vol. 3531. New York, NY. pp. 91–103.
378:
893:
795:
709:
206:
74:
913:
471:
266:
Mobile Authentication: Problems and Solutions (SpringerBriefs in Computer Science)
898:
885:
226:
194:
178:
826:
778:
429:
250:, Markus Jakobsson, Zulfikar Ramzan - Authors, Addison-Wesley Professional, 2008
193:. Later research emphasis was aimed at understanding and preventing fraud. With
962:
799:
540:"Fastwords: The New Online Password Security - Newsweek and The Daily Beast"
492:
190:
625:
450:
857:"Retroactive Detection of Malware With Applications to Mobile Platforms"
699:"Messin' with Texas Deriving Mother's Maiden Names Using Public Records"
713:
827:
T. N. Jagatic; N. A. Johnson; M. Jakobsson & F. Menczer (2007).
779:
T. N. Jagatic; N. A. Johnson; M. Jakobsson & F. Menczer (2007).
648:"Markus Jakobsson: Executive Profile & Biography - Businessweek"
357:
244:, Markus Jakobsson, Steven Myers - Editors, Wiley-Interscience, 2006
953:
890:
Secure Information Networks: Communications and Multimedia Security
146:
98:
745:"Badvertisements: Stealthy click-fraud with unwitting accessories"
742:
430:"eWeek - Author Biography - Markus Jakobsson - News & Reviews"
667:
262:, Markus Jakobsson - Editor, Wiley-IEEE Computer Society Pr, 2012
210:
562:"Hunting Mobile Threats in Memory | MIT Technology Review"
58:
928:"Markus Jakobsson: Books, Biography, Blog, Audiobooks, Kindle"
16:
American computer security researcher, entrepreneur and writer
201:
In a 1999 paper he, together with Ari Juels, coined the term
603:
139:
604:"Identity Theft Protection - Avoid ID & Credit Fraud"
166:
854:
582:
472:"Study: More phishing suckers out there than we thought"
189:
Jakobsson's early research publications were focused on
177:
from both the University of California at San Diego and
157:(APWG), an organization focused on reducing cybercrime.
696:
287:"What To Do After You've Been Hacked | Gadget Lab"
743:
M. Gandhi; M. Jakobsson & J. Ratkiewicz (2006).
623:
670:"Designated Verifier Proofs and Their Applications"
668:M. Jakobsson; K. Sako & R. Impagliazzo (1996).
379:"Technology | Users face new phishing threats"
42:Computer Security Researcher, Entrepreneur, Writer
248:Crimeware: Understanding New Attacks and Defenses
960:
645:
514:"Hunting For A Password That Only You Will Know"
405:"Phishing researcher 'targets' the unsuspecting"
829:"Designing and Conducting Phishing Experiments"
883:
132:and networking litigation group Harbor Labs.
886:"Proofs of Work and Bread Pudding Protocols"
537:
774:
772:
402:
994:Scientists from the San Francisco Bay Area
969:University of California, San Diego alumni
268:, Markus Jakobsson, Author, Springer, 2012
897:
877:
706:Applied Cryptography and Network Security
127:positions as the Principal Scientist for
855:M. Jakobsson & K. Johansson (2010).
769:
140:Companies founded and advisory positions
906:
892:. Kluwer Academic Publishers: 258–272.
961:
884:Jakobsson, Markus; Juels, Ari (1999).
752:Journal of Digital Forensics Practice
639:
559:
346:
171:University of California at San Diego
836:IEEE Technology and Society Magazine
422:
184:
407:. Computerworld.com. Archived from
33:University of California, San Diego
13:
697:V. Griffith; M. Jakobsson (2005).
314:. Bankinfosecurity.com. 2007-01-29
14:
1010:
947:
284:
356:. Harborlabs.com. Archived from
216:
920:
848:
820:
736:
690:
661:
646:Markus Jakobsson (2012-08-28).
617:
596:
575:
553:
531:
506:
485:
335:. Blogs.technet.com. 2011-09-21
232:
474:. Networkworld.com. 2006-10-18
464:
443:
396:
371:
325:
304:
278:
1:
679:. Berlin, Heidelberg: 143–154
312:"Interviews Markus Jakobsson"
272:
169:in computer science from the
899:10.1007/978-0-387-35568-9_18
650:. Investing.businessweek.com
160:
7:
560:Naone, Erica (2010-03-05).
538:Daniel Lyons (2011-06-26).
155:Anti-Phishing Working Group
10:
1015:
624:SparkCMS by Baunfire.com.
403:Jon Brodkin (2007-08-10).
260:The Death of the Internet
151:business email compromise
129:Palo Alto Research Center
117:
93:
89:
85:
73:
64:Privacy vs. authenticity
57:
50:
46:
38:
28:
21:
626:"About APWG | APWG"
583:"Software Immune System"
800:10.1145/1290958.1290968
432:. eWeek.com. 2008-04-30
205:, a central concept in
974:Lund University alumni
564:. Technologyreview.com
999:Modern cryptographers
979:American male writers
495:. SecurityCartoon.com
493:"SecurityCartoon.com"
221:He is the brother of
954:Jakobsson's homepage
914:"Andreas Jakobsson"
542:. Thedailybeast.com
80:Russell Impagliazzo
714:10.1007/11496137_7
628:. Antiphishing.org
451:"Markus Jakobsson"
165:Jakobsson holds a
781:"Social phishing"
723:978-3-540-26223-7
185:Academic research
109:
108:
101:.markus-jakobsson
52:Scientific career
1006:
942:
941:
939:
938:
924:
918:
917:
910:
904:
903:
901:
881:
875:
874:
872:
871:
866:. Washington, DC
861:
852:
846:
845:
843:
842:
833:
824:
818:
817:
815:
814:
785:
776:
767:
766:
764:
763:
749:
740:
734:
733:
731:
730:
703:
694:
688:
687:
685:
684:
674:
665:
659:
658:
656:
655:
643:
637:
636:
634:
633:
621:
615:
614:
612:
611:
600:
594:
593:
591:
590:
579:
573:
572:
570:
569:
557:
551:
550:
548:
547:
535:
529:
528:
526:
525:
510:
504:
503:
501:
500:
489:
483:
482:
480:
479:
468:
462:
461:
459:
458:
447:
441:
440:
438:
437:
426:
420:
419:
417:
416:
400:
394:
393:
391:
390:
375:
369:
368:
366:
365:
350:
344:
343:
341:
340:
329:
323:
322:
320:
319:
308:
302:
301:
299:
298:
282:
223:Hampus Jakobsson
207:cryptocurrencies
175:master's degrees
112:Markus Jakobsson
105:
102:
100:
75:Doctoral advisor
69:
23:Markus Jakobsson
19:
18:
1014:
1013:
1009:
1008:
1007:
1005:
1004:
1003:
959:
958:
950:
945:
936:
934:
926:
925:
921:
912:
911:
907:
882:
878:
869:
867:
859:
853:
849:
840:
838:
831:
825:
821:
812:
810:
783:
777:
770:
761:
759:
747:
741:
737:
728:
726:
724:
701:
695:
691:
682:
680:
672:
666:
662:
653:
651:
644:
640:
631:
629:
622:
618:
609:
607:
602:
601:
597:
588:
586:
581:
580:
576:
567:
565:
558:
554:
545:
543:
536:
532:
523:
521:
512:
511:
507:
498:
496:
491:
490:
486:
477:
475:
470:
469:
465:
456:
454:
449:
448:
444:
435:
433:
428:
427:
423:
414:
412:
401:
397:
388:
386:
377:
376:
372:
363:
361:
352:
351:
347:
338:
336:
331:
330:
326:
317:
315:
310:
309:
305:
296:
294:
283:
279:
275:
235:
227:Lund University
219:
203:"proof of work"
195:Filippo Menczer
187:
179:Lund University
163:
142:
120:
97:
67:
29:Alma mater
24:
17:
12:
11:
5:
1012:
1002:
1001:
996:
991:
986:
981:
976:
971:
957:
956:
949:
948:External links
946:
944:
943:
919:
905:
876:
847:
819:
794:(10): 94–100.
768:
735:
722:
689:
660:
638:
616:
595:
574:
552:
530:
505:
484:
463:
442:
421:
395:
370:
345:
324:
303:
276:
274:
271:
270:
269:
263:
257:
251:
245:
234:
231:
218:
215:
186:
183:
162:
159:
141:
138:
119:
116:
107:
106:
95:
91:
90:
87:
86:
83:
82:
77:
71:
70:
61:
55:
54:
48:
47:
44:
43:
40:
36:
35:
30:
26:
25:
22:
15:
9:
6:
4:
3:
2:
1011:
1000:
997:
995:
992:
990:
987:
985:
984:Living people
982:
980:
977:
975:
972:
970:
967:
966:
964:
955:
952:
951:
933:
929:
923:
915:
909:
900:
895:
891:
887:
880:
865:
858:
851:
837:
830:
823:
809:
805:
801:
797:
793:
789:
782:
775:
773:
757:
753:
746:
739:
725:
719:
715:
711:
707:
700:
693:
678:
671:
664:
649:
642:
627:
620:
605:
599:
584:
578:
563:
556:
541:
534:
519:
515:
509:
494:
488:
473:
467:
452:
446:
431:
425:
411:on 2013-06-28
410:
406:
399:
384:
380:
374:
360:on 2013-06-23
359:
355:
349:
334:
328:
313:
307:
292:
288:
281:
277:
267:
264:
261:
258:
255:
252:
249:
246:
243:
240:
239:
238:
230:
228:
224:
217:Personal life
214:
212:
208:
204:
199:
196:
192:
182:
180:
176:
173:, as well as
172:
168:
158:
156:
152:
148:
137:
133:
130:
124:
115:
113:
104:
96:
92:
88:
84:
81:
78:
76:
72:
65:
62:
60:
56:
53:
49:
45:
41:
39:Occupation(s)
37:
34:
31:
27:
20:
989:Xerox people
935:. Retrieved
931:
922:
908:
889:
879:
868:. Retrieved
863:
850:
839:. Retrieved
835:
822:
811:. Retrieved
791:
787:
760:. Retrieved
755:
751:
738:
727:. Retrieved
705:
692:
681:. Retrieved
676:
663:
652:. Retrieved
641:
630:. Retrieved
619:
608:. Retrieved
598:
587:. Retrieved
577:
566:. Retrieved
555:
544:. Retrieved
533:
522:. Retrieved
517:
508:
497:. Retrieved
487:
476:. Retrieved
466:
455:. Retrieved
445:
434:. Retrieved
424:
413:. Retrieved
409:the original
398:
387:. Retrieved
385:. 2004-10-20
382:
373:
362:. Retrieved
358:the original
348:
337:. Retrieved
327:
316:. Retrieved
306:
295:. Retrieved
290:
285:Honan, Mat.
280:
265:
259:
253:
247:
241:
236:
233:Bibliography
220:
200:
191:cryptography
188:
164:
143:
134:
125:
121:
111:
110:
63:
51:
864:HotSec 2010
788:Commun. ACM
585:. Metaforic
293:. Wired.com
181:in Sweden.
963:Categories
937:2013-03-04
870:2013-04-02
841:2013-04-02
813:2013-04-02
762:2013-04-02
729:2013-04-02
683:2013-04-02
654:2013-03-04
632:2013-03-04
610:2013-03-04
606:. LifeLock
589:2013-03-04
568:2013-03-07
546:2013-03-04
524:2013-03-07
499:2013-03-07
478:2013-03-07
457:2013-03-07
436:2013-03-04
415:2013-03-07
389:2013-03-07
364:2013-03-04
339:2013-03-04
318:2013-03-07
297:2013-03-07
273:References
453:. ITworld
161:Education
808:15077519
383:BBC News
354:"Harbor"
209:such as
147:phishing
518:NPR.org
211:Bitcoin
94:Website
932:Amazon
806:
720:
118:Career
68:(1997)
66:
59:Thesis
860:(PDF)
832:(PDF)
804:S2CID
784:(PDF)
748:(PDF)
702:(PDF)
673:(PDF)
520:. NPR
291:Wired
718:ISBN
149:and
103:.com
894:doi
796:doi
758:(2)
710:doi
167:PhD
99:www
965::
930:.
888:.
862:.
834:.
802:.
792:50
790:.
786:.
771:^
754:.
750:.
716:.
704:.
675:.
516:.
381:.
289:.
229:.
213:.
940:.
916:.
902:.
896::
873:.
844:.
816:.
798::
765:.
756:1
732:.
712::
686:.
657:.
635:.
613:.
592:.
571:.
549:.
527:.
502:.
481:.
460:.
439:.
418:.
392:.
367:.
342:.
321:.
300:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.