Mikko Hypponen

Mikko Hypponen
Mikko Hermanni Hyppönenis a computer security expert and columnist...
NationalityAmerican
ProfessionScientist
CountryUnited States of America
alarming appears biggest build competing gangs infected network rate three turning virus worms
There appears to be three different virus writing gangs turning out new worms at an alarming rate -- as if they would be competing who would build the biggest network of infected machines.
attacks buddy click dozens exploits files image messenger people seen send several since spam tries users using worm
We have seen dozens of different attacks using this vulnerability since Dec. 27. One exploits image files and tries to get users to click on them; another is an MSN Messenger worm that will send the worm to people on your buddy list, and we have seen several spam attacks.
cause detect enter hand intended machines nor politics regardless source
We want to detect malware, regardless of its source or purpose. Politics don't even enter the discussion, nor should they. Any malware, even targeted, can get out of hand and cause 'collateral damage' to machines that aren't the intended victim.
angst dig forum social teenage voters watch
It's going to be interesting to watch presidential elections in around 2040, when voters can dig up candidates' teenage angst pics and posts from old social media and discussion forum archives.
companies competition direct fierce friendly knows publicly seems technical time
It's not publicly known, but antivirus companies co-operate all the time. On the surface, antivirus vendors are direct competitors. And in fact, the competition is fierce on the sales and marketing side. But on the technical side, we're actually very friendly to each other. It seems that everyone knows everyone else.
against behavior change cheap cheaper delete future means online people store
It's so cheap to store all data. It's cheaper to keep it than to delete it. And that means people will change their behavior because they know anything they say online can be used against them in the future.
against attacks avoid banking created great products protect targeted truth
The truth is, consumer-grade antivirus products can't protect against targeted malware created by well-resourced nation-states with bulging budgets. They can protect you against run-of-the-mill malware: banking trojans, keystroke loggers and e-mail worms. But targeted attacks like these go to great lengths to avoid antivirus products on purpose.
brutally engines five history honest
One thing we should all understand is that we are brutally honest with search engines. You show me your search history, and I'll find something incriminating or something embarrassing there in five minutes. We are more honest with search engines than we are with our families.
cloud computer legal mobile operating popular rest states systems target united uses using web
The United States has an unfair advantage, as most of the popular cloud services, search engines, computer and mobile operating systems or web browsers are made by U.S. companies. When the rest of the world uses the net, they are effectively using U.S.-based services, making them a legal target for U.S. intelligence.
examples history presidents
Surveillance changes history. We know this through examples of corrupt presidents like Nixon.
account burned commerce credit future online people purchase risking somebody stay steals tend trust trusting
We're risking the future of the net. People are already losing their trust. Once you get burned once - somebody steals your credit card, or makes a purchase on your account - people tend to stay away from online commerce and from trusting online services.
best design figure hard lock money next pick time unlimited
You can get the best locksmith in the world to design the best lock he can design, is it pick proof? No, it's not: it can be very hard to pick, but it is pickable. Because you can get, say, the next 10 best locksmiths, and give them unlimited money and time, they will figure out a way to pick it.
against computer countries defending digital everyday focused foreign handful highly industry labs provide rely
Defending against military-strength malware is a real challenge for the computer security industry. Furthermore, the security industry is not global. It is highly focused in just a handful of countries. The rest of the countries rely on foreign security labs to provide their everyday digital security for them.
anonymous might operations people share truly
Anonymous is like an amoeba: it's got too many different operations run by truly different people which might not share a single person with another operation, but they use the same branding - they are part of the Anonymous brand, just like al-Qaida.