Mikko Hypponen

Mikko Hypponen
Mikko Hermanni Hyppönenis a computer security expert and columnist...
NationalityAmerican
ProfessionScientist
CountryUnited States of America
ask asks bank fake fooled gets money moves next problem says target
The target is fooled into logging into a fake bank, where they ask for his authorization code. The fake bank logs into the real bank with the one-time password and moves money around. Then it gets back to the customer, says there has been a problem and asks him to give the next code.
exploit
This is enough to invoke the exploit and infect the machine.
competing infected latest remove viruses
The latest variants of Bozori even remove competing viruses like Zotob from the infected machines.
company easily entering entire infected large phone somebody
A large company would not want somebody entering their premises with an infected phone because they could easily infect the entire company's phones.
glad guy message stupid type
I'm glad the guy was stupid enough to get caught. If you have to write viruses, something like the type of message is not bad.
countries foreigners gathering global legal nobody private rights services states target time united using visibility
Foreigners like me have no privacy rights whatsoever. Yet we keep using U.S.-based services all the time, making us a legal target for gathering and storing our private information. Other countries do surveillance as well. But nobody has the global visibility that United States does.
available based companies compete failed run services simply
Alternative services would mean that there would be services available to compete with Google, Facebook, Amazon, Dropbox, Skype, etc., and they would be run by companies not based in the U.S.A. The rest of the world has simply failed in being able to compete with them, and we really should be doing better here.
bad brand buy computer five infected internet plug situation ten turn within worm
The situation on the Internet right now is so bad that if you go and buy a brand new computer and turn it on and plug it into the Internet, it will be infected by a worm within five to ten minutes,
code ends internet seen shared whether
It all comes down to whether the code ends up being shared or not. We have not seen it out on the Internet yet.
accept phone spread user
Not one of these is able to spread by itself, always the user of the phone has to accept installing of the virus.
block break systems
If systems administrators block these URLs at their gateways, it's not going to break anything.
great mechanisms obviously offices throwing uses work
You should have mechanisms of communication, like faxes, which are obviously getting removed from offices because nobody uses them anymore. Faxes are great when e-mail doesn't work. I wouldn't be throwing them away.
attack everybody hoping looks major patch succeeding
Everybody was hoping they would get the patch out before a major attack would start. Now it looks like they are succeeding in doing just that. Well done.
attack computer hours online sleeping target
There is no need to have your computer online 24 hours (a day) as a target of an attack when you are sleeping or away from your computer.