31:
1053:
1039:
1025:
155:
156:
206:
about IoT security, which states that whenever an appliance is described as being "smart", it is vulnerable. He works as the Chief
Research Officer at WithSecure (former F-Secure for Business) and as the Principal Research Advisor at
154:
157:
1173:
1178:
1086:
437:
347:
The two greatest tools of our time have been turned into government surveillance tools. I'm talking about the mobile phone and the internet. George Orwell was an optimist.
295:
790:
868:
565:
147:
750:
733:
288:
855:
340:
Hyppönen coined the term "Cybercrime
Unicorns" to describe cybercrime organizations that are worth over a billion US dollars - a reference to
719:
222:
Hyppönen has assisted law enforcement in the United States, Europe and Asia since the 1990s on cybercrime cases and advises governments on
91:
829:
509:
934:"Twitter Security – The following people have helped us keep Twitter safe for everyone. We very much appreciate their efforts"
1168:
1079:
842:
271:, and V2 Security. In addition to data security events, Hyppönen has delivered talks at general-interest events, such as
933:
366:
Hyppönen made international news in 2011 when he tracked down and visited the authors of the first PC virus in history,
456:
990:
284:
485:
1058:
882:
1103:
353:
675:
1129:
1118:
1074:
1063:
432:
1090:
754:
255:
Hyppönen has given keynotes and presentations at a number of conferences around the world, including
775:
569:
607:"The Internet of (Vulnerable) Things: On Hypponen's Law, Security Engineering, and IoT Legislation"
965:
1098:
The
Internet of (Vulnerable) Things: On Hyppönen's Law, Security Engineering, and IoT Legislation
242:
1142:
1163:
367:
234:
916:
382:
1158:
810:
8:
1052:
1038:
322:
264:
256:
135:
1024:
313:
Hyppönen is a columnist for BetaNews and Wired. He has also written on his research for
298:(International Multilateral Partnership Against Cyber Threats) since 2007 together with
30:
795:
524:
422:
318:
628:
341:
299:
199:
646:
303:
1048:
618:
403:
307:
287:. He's also spoken at various military events, including AFCEA events and the NATO
272:
194:
1125:
Mikko
Hypponen: Clipping of CYBERWARFARE, CRIME AND SECURITY (DLD Conference 2013)
370:. Hyppönen produced a documentary of the event. The documentary was published on
824:
700:"Mikko Hypponen: Behind Enemy Lines (Hack In The Box Security Conference 2012)"
330:
268:
118:
72:
1123:
1112:
1068:
1044:
896:
699:
660:
623:
1152:
1114:
Mikko
Hypponen: Behind Enemy Lines (Hack In The Box Security Conference 2012)
632:
392:"News from the Lab", started by Hyppönen in 2004 was the first blog from any
280:
249:
951:
869:"USA Today – Documentary examines the inception of PC viruses 25 years ago"
378:
1080:"How the NSA betrayed the world's trust — time to act" (TEDxBrussels 2013)
409:
He published his first book in
October 2021, and its English translation,
223:
399:
Hyppönen has been credited by
Twitter for improving Twitter's security.
1107:
937:
393:
856:
GCHQ and NSA outsourcing cyber security tasks to third-party vendors
551:
1135:
1097:
606:
208:
96:
1070:"Safe internet will lead the future" (TEDxRotterdam, October 2011)
843:"Bank Infosecurity interview with Hypponen on Cybercrime Unicorns"
1034:
901:
704:
371:
260:
61:
897:"YouTube – Brain: Searching for the first PC virus in Pakistan"
1138:
a summary of Hyppönen's talk at LinuxCon Europe 2013. LWN.net
246:
227:
219:
Mikko Hyppönen has worked at F-Secure in
Finland since 1991.
291:'s ICCC. Hyppönen is a reserve officer in the Finnish Army.
427:
389:
276:
1174:
Recipients of the Order of the Cross of
Liberty, 3rd Class
591:
875:
314:
1179:
Chief technology officers of computer security companies
402:
Hyppönen has been the
Curator for the Malware Museum at
1059:"Fighting viruses, defending the net" (TEDGlobal 2011)
1030:
1100:. Technology Innovation Management Review, 7(4) 5–11.
751:"List of the members of the advisory board of IMPACT"
1018:
177:
1064:"Three types of online attack" (TEDxBrussels 2011)
835:
486:"CISO MAG Cybersecurity Person of the Year (2020)"
1150:
202:expert, speaker and author. He is known for the
788:
734:"The Finnish Defence Forces Annual Report 2010"
377:Hyppönen has also been documenting the rise of
106:CISO MAG Cybersecurity Person of the Year 2020
1141:10. April 2017, TTÜ Haridustehnoloogiakeskus,
294:Hyppönen is a member of the advisory board of
944:
926:
604:
647:"Mikko Hypponen background at TEDxRotterdam"
605:Hypponen, Mikko; Nyman, Linus (2017-04-19).
522:
361:
1143:Public lecture by Mikko Hyppönen at Mektory
917:"Scientific American – Malware Goes Mobile"
241:, which examined his role in defeating the
1051:
1037:
1023:
889:
673:
467:(in Finnish). No. 3. 2019. p. 22
123:Best educator in the anti-malware industry
29:
622:
525:"Conference report, Vancouver expedition"
861:
791:"A Pandora's Box We Will Regret Opening"
639:
611:Technology Innovation Management Review
1151:
743:
909:
883:"Fighting viruses, defending the net"
566:"50 Most Important People on the Web"
546:
544:
198:; born 13 October 1969) is a Finnish
193:
726:
674:Shnayerson, Michael (January 2004).
653:
132:50 Most Important People on the Web
13:
1136:Living with the surveillance state
541:
337:s Top 100 Global Thinkers report.
233:In 2004, Hyppönen cooperated with
148:Mikko Hyppönen introducing himself
14:
1190:
1010:
776:"Wired Columns by Mikko Hypponen"
991:"If It's Smart, It's Vulnerable"
510:"The FP Top 100 Global Thinkers"
152:
16:Finnish computer security expert
983:
958:
849:
817:
803:
782:
768:
712:
692:
667:
568:. March 5, 2007. Archived from
328:In 2011, he was ranked 61st in
95:Principal Research Advisor for
830:The FP Top 100 Global Thinkers
789:Mikko Hyppönnen (2012-06-05).
720:"Speaker Details: V2 Security"
598:
584:
558:
523:Helen Martin (November 2010).
516:
502:
478:
449:
413:, was published in June 2022.
411:If It's Smart, It's Vulnerable
1:
443:
1169:Finnish computer programmers
1104:References on Embassy cables
811:"Articles by Mikko Hyppönen"
7:
1096:Hyppönen and Nyman (2017),
416:
90:Chief Research Officer for
10:
1195:
465:Helsingin Reservin Sanomat
459:[Congratulations]
1091:University College London
592:"Books by Mikko Hyppönen"
362:Computer security history
226:. His team took down the
214:
195:[ˈmikːoˈhypːønen]
172:
141:
102:
86:
78:
68:
40:
28:
21:
383:first smartphone viruses
624:10.22215/timreview/1066
187:Mikko Hermanni Hyppönen
113:Top 100 Global Thinkers
45:Mikko Hermanni Hyppönen
813:. Scientific American.
359:
191:Finnish pronunciation:
345:
952:"The Malware Museum"
885:. TED. 19 July 2011.
404:The Internet Archive
379:mobile phone malware
111:61 Foreign Policy's
1087:Cybercrime Unicorns
572:on October 20, 2010
323:Scientific American
796:The New York Times
676:"The Code Warrior"
423:Antivirus software
354:PRISM surveillance
319:The New York Times
306:, Fred Piper and
300:Yevgeny Kaspersky
200:computer security
184:
183:
163:recorded May 2016
158:
1186:
1126:
1115:
1071:
1055:
1041:
1027:
1022:
1021:
1019:Official website
1005:
1004:
1002:
1001:
987:
981:
980:
978:
977:
962:
956:
955:
948:
942:
941:
936:. Archived from
930:
924:
923:
921:
913:
907:
906:
893:
887:
886:
879:
873:
872:
865:
859:
853:
847:
846:
839:
833:
832:. December 2011.
821:
815:
814:
807:
801:
800:
786:
780:
779:
772:
766:
765:
763:
762:
753:. Archived from
747:
741:
740:
738:
730:
724:
723:
716:
710:
709:
696:
690:
689:
687:
686:
671:
665:
664:
657:
651:
650:
643:
637:
636:
626:
602:
596:
595:
588:
582:
581:
579:
577:
562:
556:
555:
548:
539:
538:
536:
535:
529:
520:
514:
513:
506:
500:
499:
497:
496:
482:
476:
475:
473:
472:
462:
453:
357:
352:Hyppönen on the
342:Startup unicorns
336:
285:Google Zeitgeist
239:The Code Warrior
197:
192:
180:
160:
159:
79:Other names
58:
54:
52:
35:Hyppönen in 2006
33:
19:
18:
1194:
1193:
1189:
1188:
1187:
1185:
1184:
1183:
1149:
1148:
1124:
1113:
1069:
1017:
1016:
1013:
1008:
999:
997:
989:
988:
984:
975:
973:
964:
963:
959:
950:
949:
945:
932:
931:
927:
919:
915:
914:
910:
895:
894:
890:
881:
880:
876:
867:
866:
862:
854:
850:
841:
840:
836:
822:
818:
809:
808:
804:
787:
783:
774:
773:
769:
760:
758:
749:
748:
744:
736:
732:
731:
727:
718:
717:
713:
698:
697:
693:
684:
682:
672:
668:
659:
658:
654:
645:
644:
640:
603:
599:
590:
589:
585:
575:
573:
564:
563:
559:
550:
549:
542:
533:
531:
527:
521:
517:
508:
507:
503:
494:
492:
484:
483:
479:
470:
468:
460:
455:
454:
450:
446:
419:
364:
358:
351:
334:
217:
190:
176:
168:
167:
166:
165:
164:
161:
153:
150:
94:
64:
59:
56:
55:13 October 1969
50:
48:
47:
46:
36:
24:
17:
12:
11:
5:
1192:
1182:
1181:
1176:
1171:
1166:
1161:
1147:
1146:
1139:
1132:
1121:
1110:
1101:
1094:
1084:
1083:
1082:
1077:
1066:
1061:
1045:Mikko Hyppönen
1042:
1031:Mikko Hyppönen
1028:
1012:
1011:External links
1009:
1007:
1006:
982:
966:"Kirja - WSOY"
957:
943:
940:on 2014-07-10.
925:
908:
888:
874:
860:
858:V3.co.uk, 2013
848:
834:
825:Foreign Policy
816:
802:
781:
767:
742:
725:
711:
691:
666:
652:
638:
597:
583:
557:
540:
530:. pp. 6–7
515:
501:
477:
457:"Onnittelemme"
447:
445:
442:
441:
440:
435:
430:
425:
418:
415:
363:
360:
349:
331:Foreign Policy
304:Hamadoun Touré
250:Computer worms
237:on a feature,
216:
213:
182:
181:
174:
170:
169:
162:
151:
146:
145:
144:
143:
142:
139:
138:
119:Virus Bulletin
104:
100:
99:
88:
84:
83:
82:Mikko Hypponen
80:
76:
75:
70:
66:
65:
60:
44:
42:
38:
37:
34:
26:
25:
23:Mikko Hyppönen
22:
15:
9:
6:
4:
3:
2:
1191:
1180:
1177:
1175:
1172:
1170:
1167:
1165:
1164:Living people
1162:
1160:
1157:
1156:
1154:
1145:, youtube.com
1144:
1140:
1137:
1133:
1131:
1127:
1122:
1120:
1116:
1111:
1109:
1105:
1102:
1099:
1095:
1092:
1088:
1085:
1081:
1078:
1076:
1072:
1067:
1065:
1062:
1060:
1057:
1056:
1054:
1050:
1046:
1043:
1040:
1036:
1032:
1029:
1026:
1020:
1015:
1014:
996:
992:
986:
971:
967:
961:
953:
947:
939:
935:
929:
918:
912:
904:
903:
898:
892:
884:
878:
871:. 2011-03-08.
870:
864:
857:
852:
844:
838:
831:
827:
826:
820:
812:
806:
798:
797:
792:
785:
778:. 2012-06-01.
777:
771:
757:on 2015-03-29
756:
752:
746:
735:
729:
721:
715:
707:
706:
701:
695:
681:
677:
670:
662:
661:"TED profile"
656:
648:
642:
634:
630:
625:
620:
616:
612:
608:
601:
593:
587:
571:
567:
561:
553:
547:
545:
526:
519:
511:
505:
491:
487:
481:
466:
458:
452:
448:
439:
436:
434:
431:
429:
426:
424:
421:
420:
414:
412:
407:
405:
400:
397:
395:
391:
386:
384:
380:
375:
373:
369:
355:
348:
344:
343:
338:
333:
332:
326:
324:
320:
316:
311:
309:
308:John Thompson
305:
301:
297:
292:
290:
286:
282:
278:
275:, TEDx, DLD,
274:
270:
266:
262:
258:
253:
251:
248:
244:
240:
236:
231:
229:
225:
220:
212:
210:
205:
201:
196:
188:
179:
175:
171:
149:
140:
137:
134:2007 list by
133:
129:
126:
124:
120:
116:
114:
110:
105:
101:
98:
93:
89:
87:Occupation(s)
85:
81:
77:
74:
71:
67:
63:
57:(age 54)
43:
39:
32:
27:
20:
1093:, April 2022
998:. Retrieved
994:
985:
974:. Retrieved
972:(in Finnish)
969:
960:
946:
938:the original
928:
911:
900:
891:
877:
863:
851:
837:
823:
819:
805:
794:
784:
770:
759:. Retrieved
755:the original
745:
728:
714:
703:
694:
683:. Retrieved
679:
669:
655:
641:
614:
610:
600:
586:
574:. Retrieved
570:the original
560:
532:. Retrieved
518:
504:
493:. Retrieved
489:
480:
469:. Retrieved
464:
451:
410:
408:
406:since 2016.
401:
398:
387:
385:were found.
376:
365:
346:
339:
329:
327:
312:
293:
254:
238:
232:
221:
218:
204:Hyppönen Law
203:
186:
185:
131:
127:
122:
117:
112:
108:
107:
1159:1969 births
1134:Jake Edge:
1089:lecture at
970:www.wsoy.fi
680:Vanity Fair
617:(4): 5–11.
576:October 15,
552:"short bio"
235:Vanity Fair
230:.F botnet.
224:cyber crime
69:Nationality
1153:Categories
1106:leaked by
1000:2022-09-23
976:2022-09-21
761:2011-10-17
685:2013-09-13
534:2012-08-06
495:2020-12-13
471:2021-03-16
444:References
381:since the
130:43 on the
121:Award for
92:WithSecure
51:1969-10-13
1108:WikiLeaks
633:1927-0321
396:company.
394:antivirus
257:Black Hat
178:mikko.com
490:CISO MAG
417:See also
350:—
209:F-Secure
136:PC World
115:in 2011
97:F-Secure
1130:YouTube
1119:YouTube
1075:YouTube
1035:Twitter
902:YouTube
705:YouTube
372:YouTube
356:in 2013
289:CCD COE
261:DEF CON
243:Blaster
173:Website
73:Finnish
62:Finland
631:
438:IMPACT
296:IMPACT
215:Career
103:Awards
995:Wiley
920:(PDF)
737:(PDF)
528:(PDF)
461:(pdf)
433:EICAR
368:Brain
335:'
281:Slush
247:Sobig
228:Sobig
125:2010
629:ISSN
578:2011
428:CARO
390:blog
388:The
321:and
283:and
277:SXSW
245:and
41:Born
1128:on
1117:on
1073:on
1049:TED
1047:at
1033:on
619:doi
315:CNN
273:TED
269:RSA
265:DLD
1155::
993:.
968:.
899:.
828:.
793:.
702:.
678:.
627:.
613:.
609:.
543:^
488:.
463:.
374:.
325:.
317:,
310:.
302:,
279:,
267:,
263:,
259:,
252:.
211:.
53:)
1003:.
979:.
954:.
922:.
905:.
845:.
799:.
764:.
739:.
722:.
708:.
688:.
663:.
649:.
635:.
621::
615:7
594:.
580:.
554:.
537:.
512:.
498:.
474:.
189:(
128:#
109:#
49:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.