Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

After fighting malware for decades, this cybersecurity veteran is now hacking drones

Nomadic raises $8.4 million to untangle the data pouring out of autonomous vehicles

The final days of the Tesla Model X and S are here. All bets are on Cybercab.

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    OpenAI executive shuffle includes new role for COO Brad Lightcap to lead ‘special projects’

    4 April 2026

    Anthropic is having a moment in the private markets. SpaceX could crash the party

    4 April 2026

    Google now lets you direct avatars via messages in the Vids app

    3 April 2026

    Microsoft takes on AI rivals with three new flagship models

    3 April 2026

    Salesforce announces a heavy overhaul for Slack, with 30 new features

    2 April 2026
  • Apps

    Cameo works with TikTok to boost popularity

    4 April 2026

    ElevenLabs releases a new AI-powered music production app

    3 April 2026

    Flipboard’s new ‘social sites’ help publishers and creators tap into the open social web

    3 April 2026

    Exclusive: Beehiiv expands into podcasting, targeting Patreon

    2 April 2026

    A new dating app, Sonder, has a deliberately annoying sign-up process (and it works)

    2 April 2026
  • Crypto

    Hackers stole over $2.7 billion in crypto in 2025, data shows

    23 December 2025

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025

    Why Benchmark Made a Rare Crypto Bet on Trading App Fomo, with $17M Series A

    6 November 2025

    Solana co-founder Anatoly Yakovenko is a big fan of agentic coding

    30 October 2025

    MoviePass opens Mogul fantasy league game to the public

    29 October 2025
  • Fintech

    Cash app launches ‘pay later’ feature for P2P transfers

    3 April 2026

    Doss raises $55 million for AI inventory management that connects to ERP

    24 March 2026

    Despite stiff competition, Kalshi, Polymarket CEOs back $35m VC fund projections

    23 March 2026

    Amid legal turmoil, Kalshi is temporarily banned in Nevada

    20 March 2026

    Nominations for the Startup Battlefield 200 are still open

    19 March 2026
  • Hardware

    Nothing’s AI device design reportedly includes smart glasses and headphones

    2 April 2026

    Cognichip wants AI to design the chips that power AI, and it just raised $60 million to test

    2 April 2026

    Meta launches two new Ray-Ban glasses designed for prescription wearers

    1 April 2026

    Whoop’s valuation just tripled to $10 billion

    1 April 2026

    The Pixel 10a doesn’t have a camera bump, and it’s great

    30 March 2026
  • Media & Entertainment

    OpenAI acquires TBPN, the popular founder-led business talk show

    2 April 2026

    Roku is launching a standalone app for Howdy, its $2.99 ​​streaming service

    31 March 2026

    SXSW is making a comeback as a premier networking, ideas festival for founders and VCs

    30 March 2026

    ‘Project Hail Mary’ becomes Amazon MGM’s biggest box office hit

    30 March 2026

    Sora’s shutdown could be a reality check moment for video AI

    29 March 2026
  • Security

    After fighting malware for decades, this cybersecurity veteran is now hacking drones

    4 April 2026

    ICE says it bought Paragon’s spyware to use in drug-trafficking cases

    4 April 2026

    The European cyber agency blames hacker gangs for massive data breach and leak

    3 April 2026

    Telehealth giant Hims & Hers says its customer support system was breached

    3 April 2026

    Money transfer app Duc has exposed thousands of driver’s licenses and passports to the open web

    2 April 2026
  • Startups

    Nomadic raises $8.4 million to untangle the data pouring out of autonomous vehicles

    4 April 2026

    Yupp shuts down after raising $33 million from a16z crypto’s Chris Dixon

    4 April 2026

    Facebook’s Insider Content Moderation for the Age of Artificial Intelligence

    3 April 2026

    Commonwealth Fusion Systems relies on magnets for short-term revenue

    3 April 2026

    Different teams start with different VCs

    2 April 2026
  • Transportation

    The final days of the Tesla Model X and S are here. All bets are on Cybercab.

    4 April 2026

    Lucid blames drop in first-quarter sales on seat supplier issue

    4 April 2026

    Waymo launches robotaxi services at San Antonio International Airport

    3 April 2026

    United’s mobile app now shows TSA wait times at select airports

    3 April 2026

    Tesla’s cheaper vehicles aren’t helping its declining sales

    2 April 2026
  • Venture

    Toyota’s Woven Capital appoints new CIO and COO in push to find ‘future of mobility’

    1 April 2026

    Exclusive: Runway Launches $10M Fund, Builders Program to Back Early-Stage AI Startups

    31 March 2026

    Former Coatue Partner Raises Massive $65M Seed Fund for Enterprise AI Agent Startup

    31 March 2026

    From Moon Hotels to Cattle Grazing: 8 Startup Investors Hunted at YC Demo Day

    28 March 2026

    16 of the most interesting startups from the YC W26 Demo Day

    27 March 2026
  • Recommended Essentials
TechTost
You are at:Home»Security»After fighting malware for decades, this cybersecurity veteran is now hacking drones
Security

After fighting malware for decades, this cybersecurity veteran is now hacking drones

techtost.comBy techtost.com4 April 202608 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
After Fighting Malware For Decades, This Cybersecurity Veteran Is Now
Share
Facebook Twitter LinkedIn Pinterest Email

Mikko Hyppönen paces back and forth across the stage, his trademark dark ponytail resting against an immaculate teal suit. An experienced speaker tries to make an important point to a room full of fellow hackers and security researchers at one of the industry’s global annual meetings.

“I often call it ‘cyber security Tetris,'” he tells the audience with a serious face, tossing aside the rules of the classic video game. When you complete an entire row of bricks, the row disappears, letting the remaining bricks fall into a new row.

“So your successes disappear, while your failures pile up,” he tells the audience during his keynote address at Black Hat in Las Vegas in 2025. “The challenge we face as cybersecurity people is that our work is invisible… when you do your job perfectly, the end result is that nothing happens.”

Hyppönen’s work, however, was certainly not invisible. As one of the longest-standing players in the cybersecurity industry, it has spent more than 35 years fighting malware. When it started in the late 1980s, the term “malware” was still far from everyday language. Instead, the terms were computer “virus” or “trojans”. The Internet was still something few people had access to, and some viruses relied on infecting computers with floppy disks.

Since then, Hyppönen estimated that he has analyzed thousands of different types of malware. And thanks to his frequent speaking engagements at conferences around the world, he has become one of the most recognizable faces and respected voices in the cybersecurity community.

While Hyppönen has spent much of his life trying to prevent malware from getting into places it shouldn’t, he’s now still doing much of the same, albeit in a slightly different way: His new challenge is protecting people from drones.

Hyppönen, who is Finnish, told me during a recent interview that he lives about two hours away from Finland’s border with Russia. An increasingly hostile Russia and its 2022 full-scale invasion of Ukraine, where the majority of deaths reportedly from unmanned aerial attacks, have led Hyppönen to believe he can make a renewed impact fighting drones.

For Hyppönen, it’s also a matter of recognizing that while there are still lingering problems to be solved in the cybersecurity world — malware isn’t going anywhere and there are plenty of new problems on the horizon — the industry has made huge strides in the past two decades. An iPhone, as Hyppönen cited as an example, is an extremely secure device. The cybersecurity aspects of drone warfare, on the other hand, remain largely uncharted territory.

Image Credits:courtesy of Mikko Hypponen

From viruses and worms to malware and spyware…

Hyppönen got an early start in cybersecurity by hacking video games during the 1980s. His love of cybersecurity came from reverse engineering software to find a way to remove hacking protection from a Commodore 64 home computer. He learned to code by developing adventure games and honed his reverse engineering skills by analyzing malware at his first job at Finnish company Data Fellows, which later became the well-known antivirus manufacturer F-Secure.

Since then, Hyppönen has been at the forefront of the fight against malware, monitoring its evolution.

In the early years, virus writers developed their malicious code often purely out of passion and curiosity to see what was possible with code alone. While there was some cyber espionage, hackers had not yet discovered ways to monetize hacking by today’s standards, such as ransomware attacks. There was no cryptocurrency to facilitate extortion, no criminal market for stolen data.

Form.Afor example, it was one of the most common viruses in the early 1990s, infecting computers with floppy disks. One version of this virus didn’t destroy anything — sometimes just showing a message on the person’s screen, and that was it. But the virus traveled around the world, including landing at research stations at the South Pole, Hyppönen told me.

Hyppönen recounted the infamous ILOVEYOU viruswhich he and his colleagues first discovered in 2000. ILOVEYOU was wormable, meaning it spread automatically from computer to computer. It arrived via email as a text file, it was supposed to be a love letter. If the target opened it, it would overwrite and destroy some files on the person’s computer and then send itself to all their contacts.

The virus infected over 10 million Windows computers worldwide.

Malware has changed dramatically since then. Virtually no one develops malware as a hobby, and creating self-replicating malware is practically a guarantee that it will be caught by cybersecurity defenders who can quickly neutralize it and potentially catch its author.

Nobody does it for the love of the game anymore, according to Hyppönen. “The era of viruses is firmly behind us,” he said.

We now rarely see self-propagating worms — with rare exceptions, such as the devastating WannaCry ransomware attack from North Korea in 2017 and the massive NotPetya hacking campaign launched by Russia later that year, which brought down much of the Ukrainian internet and power grid. Now, the malware is used almost exclusively by cybercriminals, spies, and mercenary spyware developers who develop government-sponsored hacking and espionage exploits. These groups usually stay in the shadows and want to keep their tools hidden in order to continue their operations and avoid cybersecurity defenders or law enforcement.

The other differences today is that the cybersecurity industry is now estimated to be worth $250 billion. The industry has professionalized, partly out of necessity, to combat the rise of malware attacks. Defenders have gone from giving away their software for free to turning it into a paid service or product, Hyppönen said.

Computers and newer inventions like smartphones, which started to take off in the early 2000s, have become much more difficult to hack. If the tools to hack an iPhone or the Chrome browser cost six figures or even a few million dollars, Hyppönen argued, that actually makes an exploit so expensive that only the wealthy, such as governments, can use them, rather than financially motivated cybercriminals. This is a huge win for consumers and for the cybersecurity industry it’s a job well done.

a photo of a younger Mikko Hyppönen, wearing a blue shirt and tie, in a purple chair, legs up and a laptop with stickers on his lap.
Image Credits:courtesy of Mikko Hypponen

From fighting spies and criminals… to dealing with drones

In mid-2025, Hyppönen turned from cyber security to a different kind of defense work. He became the chief researcher at Sensofusion, a Helsinki-based company developing an anti-drone system for law enforcement and the military.

Hyppönen told me he was motivated to enter a burgeoning new industry because of what he saw happening in Ukraine, a war defined by drones. As a Finnish citizen, serving in the military reserves (“I can’t tell you what I do, but I can tell you they don’t give me a rifle because I’m much more destructive with the keyboard,” he tells me) and with two grandfathers who fought the Russians, Hyppönen is well aware of the presence of an enemy on the border just above his country.

“The situation is very, very important to me,” he tells me. “It’s more important to work on combating drones, not just the drones we see today, but the drones of tomorrow,” he said. “We’re on the side of humans against machines, which sounds a bit like science fiction, but that’s very specifically what we do.”

The cyber security and drone industries may seem different from each other, but there are clear parallels between the fight against malware and the fight against drones, according to Hyppönen. To combat malware, cybersecurity companies have come up with mechanisms, known as signatures, to determine what is and isn’t malware and then detect and block it. In the case of drones, Hyppönen explained, defenses include building systems that can detect and block radio-guided drones and by identifying frequencies used to control autonomous vehicles.

Hyppönen explained that it is possible to track and trace the drones by recording their radio frequencies, known as their IQ samples.

“We detect the protocol from there and create signatures to detect unknown drones,” he said.

He also explained that if you trace the protocol and frequencies used to control the drone, you can also try to carry out cyber attacks against it. You can cause the drone’s system to malfunction and crash the drone into the ground. “So in many ways, these protocol-level attacks are much, much easier in the drone world because the first step is the last step,” Hyppönen said. “If you find a vulnerability, you’re done.”

The anti-malware and anti-drone strategy isn’t the only thing that hasn’t changed in his life. The cat-and-mouse game of learning how to stop a threat, and then the enemy learning from it and devising new ways to overcome defenses, and so on, is the same in the world of drones. And then there is the identity of the enemy.

“I spent much of my career fighting against Russian malware attacks,” he said. “I’m now fighting Russian drone attacks.”

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNomadic raises $8.4 million to untangle the data pouring out of autonomous vehicles
bhanuprakash.cg
techtost.com
  • Website

Related Posts

ICE says it bought Paragon’s spyware to use in drug-trafficking cases

4 April 2026

The European cyber agency blames hacker gangs for massive data breach and leak

3 April 2026

Telehealth giant Hims & Hers says its customer support system was breached

3 April 2026
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

After fighting malware for decades, this cybersecurity veteran is now hacking drones

4 April 2026

Nomadic raises $8.4 million to untangle the data pouring out of autonomous vehicles

4 April 2026

The final days of the Tesla Model X and S are here. All bets are on Cybercab.

4 April 2026
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

Cash app launches ‘pay later’ feature for P2P transfers

3 April 2026

Doss raises $55 million for AI inventory management that connects to ERP

24 March 2026

Despite stiff competition, Kalshi, Polymarket CEOs back $35m VC fund projections

23 March 2026
Startups

Nomadic raises $8.4 million to untangle the data pouring out of autonomous vehicles

Yupp shuts down after raising $33 million from a16z crypto’s Chris Dixon

Facebook’s Insider Content Moderation for the Age of Artificial Intelligence

© 2026 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.