Knowledge

Mikko Hyppönen

Source 📝

31: 1053: 1039: 1025: 155: 156: 206:
about IoT security, which states that whenever an appliance is described as being "smart", it is vulnerable. He works as the Chief Research Officer at WithSecure (former F-Secure for Business) and as the Principal Research Advisor at
154: 157: 1173: 1178: 1086: 437: 347:
The two greatest tools of our time have been turned into government surveillance tools. I'm talking about the mobile phone and the internet. George Orwell was an optimist.
295: 790: 868: 565: 147: 750: 733: 288: 855: 340:
Hyppönen coined the term "Cybercrime Unicorns" to describe cybercrime organizations that are worth over a billion US dollars - a reference to
719: 222:
Hyppönen has assisted law enforcement in the United States, Europe and Asia since the 1990s on cybercrime cases and advises governments on
91: 829: 509: 934:"Twitter Security – The following people have helped us keep Twitter safe for everyone. We very much appreciate their efforts" 1168: 1079: 842: 271:, and V2 Security. In addition to data security events, Hyppönen has delivered talks at general-interest events, such as 933: 366:
Hyppönen made international news in 2011 when he tracked down and visited the authors of the first PC virus in history,
456: 990: 284: 485: 1058: 882: 1103: 353: 675: 1129: 1118: 1074: 1063: 432: 1090: 754: 255:
Hyppönen has given keynotes and presentations at a number of conferences around the world, including
775: 569: 607:"The Internet of (Vulnerable) Things: On Hypponen's Law, Security Engineering, and IoT Legislation" 965: 1098:
The Internet of (Vulnerable) Things: On Hyppönen's Law, Security Engineering, and IoT Legislation
242: 1142: 1163: 367: 234: 916: 382: 1158: 810: 8: 1052: 1038: 322: 264: 256: 135: 1024: 313:
Hyppönen is a columnist for BetaNews and Wired. He has also written on his research for
298:(International Multilateral Partnership Against Cyber Threats) since 2007 together with 30: 795: 524: 422: 318: 628: 341: 299: 199: 646: 303: 1048: 618: 403: 307: 287:. He's also spoken at various military events, including AFCEA events and the NATO 272: 194: 1125:
Mikko Hypponen: Clipping of CYBERWARFARE, CRIME AND SECURITY (DLD Conference 2013)
370:. Hyppönen produced a documentary of the event. The documentary was published on 824: 700:"Mikko Hypponen: Behind Enemy Lines (Hack In The Box Security Conference 2012)" 330: 268: 118: 72: 1123: 1112: 1068: 1044: 896: 699: 660: 623: 1152: 1114:
Mikko Hypponen: Behind Enemy Lines (Hack In The Box Security Conference 2012)
632: 392:"News from the Lab", started by Hyppönen in 2004 was the first blog from any 280: 249: 951: 869:"USA Today – Documentary examines the inception of PC viruses 25 years ago" 378: 1080:"How the NSA betrayed the world's trust — time to act" (TEDxBrussels 2013) 409:
He published his first book in October 2021, and its English translation,
223: 399:
Hyppönen has been credited by Twitter for improving Twitter's security.
1107: 937: 393: 856:
GCHQ and NSA outsourcing cyber security tasks to third-party vendors
551: 1135: 1097: 606: 208: 96: 1070:"Safe internet will lead the future" (TEDxRotterdam, October 2011) 843:"Bank Infosecurity interview with Hypponen on Cybercrime Unicorns" 1034: 901: 704: 371: 260: 61: 897:"YouTube – Brain: Searching for the first PC virus in Pakistan" 1138:
a summary of Hyppönen's talk at LinuxCon Europe 2013. LWN.net
246: 227: 219:
Mikko Hyppönen has worked at F-Secure in Finland since 1991.
291:'s ICCC. Hyppönen is a reserve officer in the Finnish Army. 427: 389: 276: 1174:
Recipients of the Order of the Cross of Liberty, 3rd Class
591: 875: 314: 1179:
Chief technology officers of computer security companies
402:
Hyppönen has been the Curator for the Malware Museum at
1059:"Fighting viruses, defending the net" (TEDGlobal 2011) 1030: 1100:. Technology Innovation Management Review, 7(4) 5–11. 751:"List of the members of the advisory board of IMPACT" 1018: 177: 1064:"Three types of online attack" (TEDxBrussels 2011) 835: 486:"CISO MAG Cybersecurity Person of the Year (2020)" 1150: 202:expert, speaker and author. He is known for the 788: 734:"The Finnish Defence Forces Annual Report 2010" 377:Hyppönen has also been documenting the rise of 106:CISO MAG Cybersecurity Person of the Year 2020 1141:10. April 2017, TTÜ Haridustehnoloogiakeskus, 294:Hyppönen is a member of the advisory board of 944: 926: 604: 647:"Mikko Hypponen background at TEDxRotterdam" 605:Hypponen, Mikko; Nyman, Linus (2017-04-19). 522: 361: 1143:Public lecture by Mikko Hyppönen at Mektory 917:"Scientific American – Malware Goes Mobile" 241:, which examined his role in defeating the 1051: 1037: 1023: 889: 673: 467:(in Finnish). No. 3. 2019. p. 22 123:Best educator in the anti-malware industry 29: 622: 525:"Conference report, Vancouver expedition" 861: 791:"A Pandora's Box We Will Regret Opening" 639: 611:Technology Innovation Management Review 1151: 743: 909: 883:"Fighting viruses, defending the net" 566:"50 Most Important People on the Web" 546: 544: 198:; born 13 October 1969) is a Finnish 193: 726: 674:Shnayerson, Michael (January 2004). 653: 132:50 Most Important People on the Web 13: 1136:Living with the surveillance state 541: 337:s Top 100 Global Thinkers report. 233:In 2004, Hyppönen cooperated with 148:Mikko Hyppönen introducing himself 14: 1190: 1010: 776:"Wired Columns by Mikko Hypponen" 991:"If It's Smart, It's Vulnerable" 510:"The FP Top 100 Global Thinkers" 152: 16:Finnish computer security expert 983: 958: 849: 817: 803: 782: 768: 712: 692: 667: 568:. March 5, 2007. Archived from 328:In 2011, he was ranked 61st in 95:Principal Research Advisor for 830:The FP Top 100 Global Thinkers 789:Mikko Hyppönnen (2012-06-05). 720:"Speaker Details: V2 Security" 598: 584: 558: 523:Helen Martin (November 2010). 516: 502: 478: 449: 413:, was published in June 2022. 411:If It's Smart, It's Vulnerable 1: 443: 1169:Finnish computer programmers 1104:References on Embassy cables 811:"Articles by Mikko Hyppönen" 7: 1096:Hyppönen and Nyman (2017), 416: 90:Chief Research Officer for 10: 1195: 465:Helsingin Reservin Sanomat 459:[Congratulations] 1091:University College London 592:"Books by Mikko Hyppönen" 362:Computer security history 226:. His team took down the 214: 195:[ˈmikːoˈhypːønen] 172: 141: 102: 86: 78: 68: 40: 28: 21: 383:first smartphone viruses 624:10.22215/timreview/1066 187:Mikko Hermanni Hyppönen 113:Top 100 Global Thinkers 45:Mikko Hermanni Hyppönen 813:. Scientific American. 359: 191:Finnish pronunciation: 345: 952:"The Malware Museum" 885:. TED. 19 July 2011. 404:The Internet Archive 379:mobile phone malware 111:61 Foreign Policy's 1087:Cybercrime Unicorns 572:on October 20, 2010 323:Scientific American 796:The New York Times 676:"The Code Warrior" 423:Antivirus software 354:PRISM surveillance 319:The New York Times 306:, Fred Piper and 300:Yevgeny Kaspersky 200:computer security 184: 183: 163:recorded May 2016 158: 1186: 1126: 1115: 1071: 1055: 1041: 1027: 1022: 1021: 1019:Official website 1005: 1004: 1002: 1001: 987: 981: 980: 978: 977: 962: 956: 955: 948: 942: 941: 936:. Archived from 930: 924: 923: 921: 913: 907: 906: 893: 887: 886: 879: 873: 872: 865: 859: 853: 847: 846: 839: 833: 832:. December 2011. 821: 815: 814: 807: 801: 800: 786: 780: 779: 772: 766: 765: 763: 762: 753:. Archived from 747: 741: 740: 738: 730: 724: 723: 716: 710: 709: 696: 690: 689: 687: 686: 671: 665: 664: 657: 651: 650: 643: 637: 636: 626: 602: 596: 595: 588: 582: 581: 579: 577: 562: 556: 555: 548: 539: 538: 536: 535: 529: 520: 514: 513: 506: 500: 499: 497: 496: 482: 476: 475: 473: 472: 462: 453: 357: 352:Hyppönen on the 342:Startup unicorns 336: 285:Google Zeitgeist 239:The Code Warrior 197: 192: 180: 160: 159: 79:Other names 58: 54: 52: 35:Hyppönen in 2006 33: 19: 18: 1194: 1193: 1189: 1188: 1187: 1185: 1184: 1183: 1149: 1148: 1124: 1113: 1069: 1017: 1016: 1013: 1008: 999: 997: 989: 988: 984: 975: 973: 964: 963: 959: 950: 949: 945: 932: 931: 927: 919: 915: 914: 910: 895: 894: 890: 881: 880: 876: 867: 866: 862: 854: 850: 841: 840: 836: 822: 818: 809: 808: 804: 787: 783: 774: 773: 769: 760: 758: 749: 748: 744: 736: 732: 731: 727: 718: 717: 713: 698: 697: 693: 684: 682: 672: 668: 659: 658: 654: 645: 644: 640: 603: 599: 590: 589: 585: 575: 573: 564: 563: 559: 550: 549: 542: 533: 531: 527: 521: 517: 508: 507: 503: 494: 492: 484: 483: 479: 470: 468: 460: 455: 454: 450: 446: 419: 364: 358: 351: 334: 217: 190: 176: 168: 167: 166: 165: 164: 161: 153: 150: 94: 64: 59: 56: 55:13 October 1969 50: 48: 47: 46: 36: 24: 17: 12: 11: 5: 1192: 1182: 1181: 1176: 1171: 1166: 1161: 1147: 1146: 1139: 1132: 1121: 1110: 1101: 1094: 1084: 1083: 1082: 1077: 1066: 1061: 1045:Mikko Hyppönen 1042: 1031:Mikko Hyppönen 1028: 1012: 1011:External links 1009: 1007: 1006: 982: 966:"Kirja - WSOY" 957: 943: 940:on 2014-07-10. 925: 908: 888: 874: 860: 858:V3.co.uk, 2013 848: 834: 825:Foreign Policy 816: 802: 781: 767: 742: 725: 711: 691: 666: 652: 638: 597: 583: 557: 540: 530:. pp. 6–7 515: 501: 477: 457:"Onnittelemme" 447: 445: 442: 441: 440: 435: 430: 425: 418: 415: 363: 360: 349: 331:Foreign Policy 304:Hamadoun Touré 250:Computer worms 237:on a feature, 216: 213: 182: 181: 174: 170: 169: 162: 151: 146: 145: 144: 143: 142: 139: 138: 119:Virus Bulletin 104: 100: 99: 88: 84: 83: 82:Mikko Hypponen 80: 76: 75: 70: 66: 65: 60: 44: 42: 38: 37: 34: 26: 25: 23:Mikko Hyppönen 22: 15: 9: 6: 4: 3: 2: 1191: 1180: 1177: 1175: 1172: 1170: 1167: 1165: 1164:Living people 1162: 1160: 1157: 1156: 1154: 1145:, youtube.com 1144: 1140: 1137: 1133: 1131: 1127: 1122: 1120: 1116: 1111: 1109: 1105: 1102: 1099: 1095: 1092: 1088: 1085: 1081: 1078: 1076: 1072: 1067: 1065: 1062: 1060: 1057: 1056: 1054: 1050: 1046: 1043: 1040: 1036: 1032: 1029: 1026: 1020: 1015: 1014: 996: 992: 986: 971: 967: 961: 953: 947: 939: 935: 929: 918: 912: 904: 903: 898: 892: 884: 878: 871:. 2011-03-08. 870: 864: 857: 852: 844: 838: 831: 827: 826: 820: 812: 806: 798: 797: 792: 785: 778:. 2012-06-01. 777: 771: 757:on 2015-03-29 756: 752: 746: 735: 729: 721: 715: 707: 706: 701: 695: 681: 677: 670: 662: 661:"TED profile" 656: 648: 642: 634: 630: 625: 620: 616: 612: 608: 601: 593: 587: 571: 567: 561: 553: 547: 545: 526: 519: 511: 505: 491: 487: 481: 466: 458: 452: 448: 439: 436: 434: 431: 429: 426: 424: 421: 420: 414: 412: 407: 405: 400: 397: 395: 391: 386: 384: 380: 375: 373: 369: 355: 348: 344: 343: 338: 333: 332: 326: 324: 320: 316: 311: 309: 308:John Thompson 305: 301: 297: 292: 290: 286: 282: 278: 275:, TEDx, DLD, 274: 270: 266: 262: 258: 253: 251: 248: 244: 240: 236: 231: 229: 225: 220: 212: 210: 205: 201: 196: 188: 179: 175: 171: 149: 140: 137: 134:2007 list by 133: 129: 126: 124: 120: 116: 114: 110: 105: 101: 98: 93: 89: 87:Occupation(s) 85: 81: 77: 74: 71: 67: 63: 57:(age 54) 43: 39: 32: 27: 20: 1093:, April 2022 998:. Retrieved 994: 985: 974:. Retrieved 972:(in Finnish) 969: 960: 946: 938:the original 928: 911: 900: 891: 877: 863: 851: 837: 823: 819: 805: 794: 784: 770: 759:. Retrieved 755:the original 745: 728: 714: 703: 694: 683:. Retrieved 679: 669: 655: 641: 614: 610: 600: 586: 574:. Retrieved 570:the original 560: 532:. Retrieved 518: 504: 493:. Retrieved 489: 480: 469:. Retrieved 464: 451: 410: 408: 406:since 2016. 401: 398: 387: 385:were found. 376: 365: 346: 339: 329: 327: 312: 293: 254: 238: 232: 221: 218: 204:Hyppönen Law 203: 186: 185: 131: 127: 122: 117: 112: 108: 107: 1159:1969 births 1134:Jake Edge: 1089:lecture at 970:www.wsoy.fi 680:Vanity Fair 617:(4): 5–11. 576:October 15, 552:"short bio" 235:Vanity Fair 230:.F botnet. 224:cyber crime 69:Nationality 1153:Categories 1106:leaked by 1000:2022-09-23 976:2022-09-21 761:2011-10-17 685:2013-09-13 534:2012-08-06 495:2020-12-13 471:2021-03-16 444:References 381:since the 130:43 on the 121:Award for 92:WithSecure 51:1969-10-13 1108:WikiLeaks 633:1927-0321 396:company. 394:antivirus 257:Black Hat 178:mikko.com 490:CISO MAG 417:See also 350:—  209:F-Secure 136:PC World 115:in 2011 97:F-Secure 1130:YouTube 1119:YouTube 1075:YouTube 1035:Twitter 902:YouTube 705:YouTube 372:YouTube 356:in 2013 289:CCD COE 261:DEF CON 243:Blaster 173:Website 73:Finnish 62:Finland 631:  438:IMPACT 296:IMPACT 215:Career 103:Awards 995:Wiley 920:(PDF) 737:(PDF) 528:(PDF) 461:(pdf) 433:EICAR 368:Brain 335:' 281:Slush 247:Sobig 228:Sobig 125:2010 629:ISSN 578:2011 428:CARO 390:blog 388:The 321:and 283:and 277:SXSW 245:and 41:Born 1128:on 1117:on 1073:on 1049:TED 1047:at 1033:on 619:doi 315:CNN 273:TED 269:RSA 265:DLD 1155:: 993:. 968:. 899:. 828:. 793:. 702:. 678:. 627:. 613:. 609:. 543:^ 488:. 463:. 374:. 325:. 317:, 310:. 302:, 279:, 267:, 263:, 259:, 252:. 211:. 53:) 1003:. 979:. 954:. 922:. 905:. 845:. 799:. 764:. 739:. 722:. 708:. 688:. 663:. 649:. 635:. 621:: 615:7 594:. 580:. 554:. 537:. 512:. 498:. 474:. 189:( 128:# 109:# 49:(

Index


Finland
Finnish
WithSecure
F-Secure
Virus Bulletin
PC World
Mikko Hyppönen introducing himself
mikko.com
[ˈmikːoˈhypːønen]
computer security
F-Secure
cyber crime
Sobig
Vanity Fair
Blaster
Sobig
Computer worms
Black Hat
DEF CON
DLD
RSA
TED
SXSW
Slush
Google Zeitgeist
CCD COE
IMPACT
Yevgeny Kaspersky
Hamadoun Touré

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.