fbpx
Wikipedia

Mikko Hyppönen

Mikko Hermanni Hyppönen (Finnish pronunciation: [ˈmikːo ˈhypːønen]; born 13 October 1969) is a Finnish computer security expert, speaker and author.[7] He is known for the Hyppönen Law about IoT security, which states that whenever an appliance is described as being "smart", it is vulnerable.[8] He works as the Chief Research Officer at WithSecure (former F-Secure for Business) and as the Principal Research Advisor at F-Secure.

Mikko Hyppönen
Hyppönen in 2006
Born
Mikko Hermanni Hyppönen

(1969-10-13) 13 October 1969 (age 54)[1]
NationalityFinnish
Other namesMikko Hypponen
Occupation(s)Chief Research Officer for WithSecure
Principal Research Advisor for F-Secure
AwardsCISO MAG Cybersecurity Person of the Year 2020[2]

#61 Foreign Policy's Top 100 Global Thinkers in 2011[3]

Virus Bulletin Award for Best educator in the anti-malware industry 2010[4][5]

#43 on the 50 Most Important People on the Web 2007 list by PC World[6]
Websitemikko.com

Career edit

Mikko Hyppönen has worked at F-Secure in Finland since 1991.[5]

Hyppönen has assisted law enforcement in the United States, Europe and Asia since the 1990s on cybercrime cases and advises governments on cyber crime.[9] His team took down the Sobig.F botnet.[10]

In 2004, Hyppönen cooperated with Vanity Fair on a feature, The Code Warrior, which examined his role in defeating the Blaster and Sobig Computer worms.[11]

Hyppönen has given keynotes and presentations at a number of conferences around the world, including Black Hat, DEF CON, DLD,[12] RSA, and V2 Security.[13] In addition to data security events, Hyppönen has delivered talks at general-interest events, such as TED, TEDx, DLD, SXSW, Slush and Google Zeitgeist. He's also spoken at various military events, including AFCEA events and the NATO CCD COE's ICCC. Hyppönen is a reserve officer in the Finnish Army.[14]

Hyppönen is a member of the advisory board of IMPACT (International Multilateral Partnership Against Cyber Threats) since 2007 together with Yevgeny Kaspersky, Hamadoun Touré, Fred Piper and John Thompson.[15]

Hyppönen is a columnist for BetaNews and Wired.[16] He has also written on his research for CNN, The New York Times[17] and Scientific American.[18]

In 2011, he was ranked 61st in Foreign Policy's Top 100 Global Thinkers report.[19]

Hyppönen coined the term "Cybercrime Unicorns" to describe cybercrime organizations that are worth over a billion US dollars - a reference to Startup unicorns[20]

The two greatest tools of our time have been turned into government surveillance tools. I'm talking about the mobile phone and the internet. George Orwell was an optimist.

— Hyppönen on the PRISM surveillance in 2013[21]

Computer security history edit

Hyppönen made international news in 2011[22][23] when he tracked down and visited the authors of the first PC virus in history, Brain. Hyppönen produced a documentary of the event. The documentary was published on YouTube.[24]

Hyppönen has also been documenting the rise of mobile phone malware since the first smartphone viruses were found.[25]

The blog "News from the Lab", started by Hyppönen in 2004 was the first blog from any antivirus company.

Hyppönen has been credited by Twitter for improving Twitter's security.[26]

Hyppönen has been the Curator for the Malware Museum at The Internet Archive since 2016.[27]

He published his first book in October 2021,[28] and its English translation, If It's Smart, It's Vulnerable, was published in June 2022.[29]

See also edit

References edit

  1. ^ "Onnittelemme" [Congratulations] (pdf). Helsingin Reservin Sanomat (in Finnish). No. 3. 2019. p. 22. Retrieved 2021-03-16.
  2. ^ "CISO MAG Cybersecurity Person of the Year (2020)". CISO MAG. Retrieved 2020-12-13.
  3. ^ "The FP Top 100 Global Thinkers".
  4. ^ Helen Martin (November 2010). "Conference report, Vancouver expedition" (PDF). pp. 6–7. Retrieved 2012-08-06.
  5. ^ a b "short bio".
  6. ^ . March 5, 2007. Archived from the original on October 20, 2010. Retrieved October 15, 2011.
  7. ^ "Books by Mikko Hyppönen".
  8. ^ Hypponen, Mikko; Nyman, Linus (2017-04-19). "The Internet of (Vulnerable) Things: On Hypponen's Law, Security Engineering, and IoT Legislation". Technology Innovation Management Review. 7 (4): 5–11. doi:10.22215/timreview/1066. ISSN 1927-0321.
  9. ^ "Mikko Hypponen background at TEDxRotterdam".
  10. ^ "TED profile".
  11. ^ Shnayerson, Michael (January 2004). "The Code Warrior". Vanity Fair. Retrieved 2013-09-13.
  12. ^ "Mikko Hypponen: Behind Enemy Lines (Hack In The Box Security Conference 2012)". YouTube.
  13. ^ "Speaker Details: V2 Security".
  14. ^ "The Finnish Defence Forces Annual Report 2010" (PDF).
  15. ^ . Archived from the original on 2015-03-29. Retrieved 2011-10-17.
  16. ^ "Wired Columns by Mikko Hypponen". 2012-06-01.
  17. ^ Mikko Hyppönnen (2012-06-05). "A Pandora's Box We Will Regret Opening". The New York Times.
  18. ^ "Articles by Mikko Hyppönen". Scientific American.
  19. ^ Foreign Policy. The FP Top 100 Global Thinkers. December 2011.
  20. ^ "Bank Infosecurity interview with Hypponen on Cybercrime Unicorns".
  21. ^ GCHQ and NSA outsourcing cyber security tasks to third-party vendors V3.co.uk, 2013
  22. ^ "USA Today – Documentary examines the inception of PC viruses 25 years ago". 2011-03-08.
  23. ^ "Fighting viruses, defending the net". TED. 19 July 2011.
  24. ^ "YouTube – Brain: Searching for the first PC virus in Pakistan". YouTube.
  25. ^ "Scientific American – Malware Goes Mobile" (PDF).
  26. ^ . Archived from the original on 2014-07-10.
  27. ^ "The Malware Museum".
  28. ^ "Kirja - WSOY". www.wsoy.fi (in Finnish). Retrieved 2022-09-21.
  29. ^ "If It's Smart, It's Vulnerable". Wiley. Retrieved 2022-09-23.

External links edit

  • Official website  
  • Mikko Hyppönen on Twitter  
  • Mikko Hyppönen at TED  
    • "Fighting viruses, defending the net" (TEDGlobal 2011)
    • "Three types of online attack" (TEDxBrussels 2011)
    • "Safe internet will lead the future" (TEDxRotterdam, October 2011) on YouTube
    • "How the NSA betrayed the world's trust — time to act" (TEDxBrussels 2013)
  • Cybercrime Unicorns lecture at University College London, April 2022
  • Hyppönen and Nyman (2017), The Internet of (Vulnerable) Things: On Hyppönen's Law, Security Engineering, and IoT Legislation. Technology Innovation Management Review, 7(4) 5–11.
  • References on Embassy cables leaked by WikiLeaks
  • Mikko Hypponen: Behind Enemy Lines (Hack In The Box Security Conference 2012) on YouTube
  • Mikko Hypponen: Clipping of CYBERWARFARE, CRIME AND SECURITY (DLD Conference 2013) on YouTube
  • Jake Edge: Living with the surveillance state a summary of Hyppönen's talk at LinuxCon Europe 2013. LWN.net
  • 10. April 2017, TTÜ Haridustehnoloogiakeskus, Public lecture by Mikko Hyppönen at Mektory, youtube.com

mikko, hyppönen, mikko, hermanni, hyppönen, finnish, pronunciation, ˈmikːo, ˈhypːønen, born, october, 1969, finnish, computer, security, expert, speaker, author, known, hyppönen, about, security, which, states, that, whenever, appliance, described, being, smar. Mikko Hermanni Hypponen Finnish pronunciation ˈmikːo ˈhypːonen born 13 October 1969 is a Finnish computer security expert speaker and author 7 He is known for the Hypponen Law about IoT security which states that whenever an appliance is described as being smart it is vulnerable 8 He works as the Chief Research Officer at WithSecure former F Secure for Business and as the Principal Research Advisor at F Secure Mikko HypponenHypponen in 2006BornMikko Hermanni Hypponen 1969 10 13 13 October 1969 age 54 1 FinlandNationalityFinnishOther namesMikko HypponenOccupation s Chief Research Officer for WithSecurePrincipal Research Advisor for F SecureAwardsCISO MAG Cybersecurity Person of the Year 2020 2 61 Foreign Policy s Top 100 Global Thinkers in 2011 3 Virus Bulletin Award for Best educator in the anti malware industry 2010 4 5 43 on the 50 Most Important People on the Web 2007 list by PC World 6 Mikko Hypponen introducing himself source source source recorded May 2016Websitemikko com Contents 1 Career 2 Computer security history 3 See also 4 References 5 External linksCareer editMikko Hypponen has worked at F Secure in Finland since 1991 5 Hypponen has assisted law enforcement in the United States Europe and Asia since the 1990s on cybercrime cases and advises governments on cyber crime 9 His team took down the Sobig F botnet 10 In 2004 Hypponen cooperated with Vanity Fair on a feature The Code Warrior which examined his role in defeating the Blaster and Sobig Computer worms 11 Hypponen has given keynotes and presentations at a number of conferences around the world including Black Hat DEF CON DLD 12 RSA and V2 Security 13 In addition to data security events Hypponen has delivered talks at general interest events such as TED TEDx DLD SXSW Slush and Google Zeitgeist He s also spoken at various military events including AFCEA events and the NATO CCD COE s ICCC Hypponen is a reserve officer in the Finnish Army 14 Hypponen is a member of the advisory board of IMPACT International Multilateral Partnership Against Cyber Threats since 2007 together with Yevgeny Kaspersky Hamadoun Toure Fred Piper and John Thompson 15 Hypponen is a columnist for BetaNews and Wired 16 He has also written on his research for CNN The New York Times 17 and Scientific American 18 In 2011 he was ranked 61st in Foreign Policy s Top 100 Global Thinkers report 19 Hypponen coined the term Cybercrime Unicorns to describe cybercrime organizations that are worth over a billion US dollars a reference to Startup unicorns 20 The two greatest tools of our time have been turned into government surveillance tools I m talking about the mobile phone and the internet George Orwell was an optimist Hypponen on the PRISM surveillance in 2013 21 Computer security history editHypponen made international news in 2011 22 23 when he tracked down and visited the authors of the first PC virus in history Brain Hypponen produced a documentary of the event The documentary was published on YouTube 24 Hypponen has also been documenting the rise of mobile phone malware since the first smartphone viruses were found 25 The blog News from the Lab started by Hypponen in 2004 was the first blog from any antivirus company Hypponen has been credited by Twitter for improving Twitter s security 26 Hypponen has been the Curator for the Malware Museum at The Internet Archive since 2016 27 He published his first book in October 2021 28 and its English translation If It s Smart It s Vulnerable was published in June 2022 29 See also editAntivirus software CARO EICAR IMPACTReferences edit Onnittelemme Congratulations pdf Helsingin Reservin Sanomat in Finnish No 3 2019 p 22 Retrieved 2021 03 16 CISO MAG Cybersecurity Person of the Year 2020 CISO MAG Retrieved 2020 12 13 The FP Top 100 Global Thinkers Helen Martin November 2010 Conference report Vancouver expedition PDF pp 6 7 Retrieved 2012 08 06 a b short bio 50 Most Important People on the Web March 5 2007 Archived from the original on October 20 2010 Retrieved October 15 2011 Books by Mikko Hypponen Hypponen Mikko Nyman Linus 2017 04 19 The Internet of Vulnerable Things On Hypponen s Law Security Engineering and IoT Legislation Technology Innovation Management Review 7 4 5 11 doi 10 22215 timreview 1066 ISSN 1927 0321 Mikko Hypponen background at TEDxRotterdam TED profile Shnayerson Michael January 2004 The Code Warrior Vanity Fair Retrieved 2013 09 13 Mikko Hypponen Behind Enemy Lines Hack In The Box Security Conference 2012 YouTube Speaker Details V2 Security The Finnish Defence Forces Annual Report 2010 PDF List of the members of the advisory board of IMPACT Archived from the original on 2015 03 29 Retrieved 2011 10 17 Wired Columns by Mikko Hypponen 2012 06 01 Mikko Hypponnen 2012 06 05 A Pandora s Box We Will Regret Opening The New York Times Articles by Mikko Hypponen Scientific American Foreign Policy The FP Top 100 Global Thinkers December 2011 Bank Infosecurity interview with Hypponen on Cybercrime Unicorns GCHQ and NSA outsourcing cyber security tasks to third party vendors V3 co uk 2013 USA Today Documentary examines the inception of PC viruses 25 years ago 2011 03 08 Fighting viruses defending the net TED 19 July 2011 YouTube Brain Searching for the first PC virus in Pakistan YouTube Scientific American Malware Goes Mobile PDF Twitter Security The following people have helped us keep Twitter safe for everyone We very much appreciate their efforts Archived from the original on 2014 07 10 The Malware Museum Kirja WSOY www wsoy fi in Finnish Retrieved 2022 09 21 If It s Smart It s Vulnerable Wiley Retrieved 2022 09 23 External links edit nbsp Wikimedia Commons has media related to Mikko Hypponen nbsp Wikiquote has quotations related to Mikko Hypponen Official website nbsp Mikko Hypponen on Twitter nbsp Mikko Hypponen at TED nbsp Fighting viruses defending the net TEDGlobal 2011 Three types of online attack TEDxBrussels 2011 Safe internet will lead the future TEDxRotterdam October 2011 on YouTube How the NSA betrayed the world s trust time to act TEDxBrussels 2013 Cybercrime Unicorns lecture at University College London April 2022 Hypponen and Nyman 2017 The Internet of Vulnerable Things On Hypponen s Law Security Engineering and IoT Legislation Technology Innovation Management Review 7 4 5 11 References on Embassy cables leaked by WikiLeaks Mikko Hypponen Behind Enemy Lines Hack In The Box Security Conference 2012 on YouTube Mikko Hypponen Clipping of CYBERWARFARE CRIME AND SECURITY DLD Conference 2013 on YouTube Jake Edge Living with the surveillance state a summary of Hypponen s talk at LinuxCon Europe 2013 LWN net 10 April 2017 TTU Haridustehnoloogiakeskus Public lecture by Mikko Hypponen at Mektory youtube com Retrieved from https en wikipedia org w index php title Mikko Hypponen amp oldid 1194555711, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.