Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

UK government says 100 countries have spyware that can hack people’s phones

Why Tokyo is the most important tech destination of 2026

India’s Snabbit is seeking fresh funding at a $400 million valuation, sources say

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    Google will invest up to $40 billion in Anthropic in cash and computing

    25 April 2026

    Meta’s loss is Thinking Machines’ gain

    25 April 2026

    Uber CTO Praveen Neppalli Naga joins StrictlyVC SF

    24 April 2026

    Meet Noscroll, an AI bot that does the doomscroll for you

    24 April 2026

    Another customer of troubled startup Delve suffered a major security incident

    23 April 2026
  • Apps

    X launches standalone XChat app on iOS

    25 April 2026

    Two college kids raise $5.1 million to build an AI social network on iMessage

    25 April 2026

    Nothing introduces an AI-powered dictation tool

    24 April 2026

    These are the countries that are moving to ban social media for children

    24 April 2026

    WhatsApp adds prepaid phone recharges in India as payment usage continues to lag

    23 April 2026
  • Crypto

    British cryptographer Adam Back denies NYT report that he is Bitcoin creator Satoshi Nakamoto

    9 April 2026

    Hackers stole over $2.7 billion in crypto in 2025, data shows

    23 December 2025

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025

    Why Benchmark Made a Rare Crypto Bet on Trading App Fomo, with $17M Series A

    6 November 2025

    Solana co-founder Anatoly Yakovenko is a big fan of agentic coding

    30 October 2025
  • Fintech

    Steve Ballmer slams founder he backed, who pleaded guilty to fraud: ‘I was cheated and I feel stupid’

    25 April 2026

    Salmon raises $100 million in equity and debt to bring digital credit to unbanked Filipinos

    24 April 2026

    Cash App targets a new type of customer: children aged 6 to 12 years

    22 April 2026

    Revolut eyes up to $200 billion valuation in potential IPO

    22 April 2026

    Once close enough for a takeover, Stripe and Airwallex are now going after each other

    18 April 2026
  • Hardware

    In another crazy turn for AI chips, Meta signs deal for millions of Amazon AI processors

    25 April 2026

    Boosted Mac minis flood eBay amid AI-fueled shortages

    25 April 2026

    Era raises $11 million to build a software platform for AI gadgets

    24 April 2026

    Apple’s John Ternus will run one of the most powerful companies in the world. work is a minefield

    22 April 2026

    Tim Cook steps down as Apple CEO: Here’s a look at his 15-year legacy, from new products and services to China expansion

    22 April 2026
  • Media & Entertainment

    India’s app market is booming — but global platforms are raking in most of the profits

    23 April 2026

    YouTube extends its AI similarity detection technology to celebrities

    21 April 2026

    Deezer says 44% of songs uploaded to its platform every day are created with artificial intelligence

    20 April 2026

    Netflix plans to add a vertical video stream, use AI for recommendations

    17 April 2026

    Netflix co-founder and chairman Reed Hastings is stepping down from the board

    17 April 2026
  • Security

    UK government says 100 countries have spyware that can hack people’s phones

    25 April 2026

    Surveillance vendors caught abusing telecom access to track people’s phone locations, investigators say

    25 April 2026

    Another spyware maker was caught distributing fake Android tracking apps

    24 April 2026

    Trump’s pick to head the US cyber agency CISA is asking to step down

    24 April 2026

    Vercel says some of its customer data was stolen before the recent hack

    23 April 2026
  • Startups

    Why Tokyo is the most important tech destination of 2026

    25 April 2026

    From Stage to Future: Where Are Startup Battlefield Alumni Now?

    25 April 2026

    Don’t stop hiring people – stop hiring the wrong people, says Artisan founder

    24 April 2026

    Redwood Materials loses COO amid layoffs, restructuring

    24 April 2026

    Beehiiv introduces new creator tools, including webinars and customizable payments

    23 April 2026
  • Transportation

    Production of the Rivian R2 has begun despite tornado damage at the factory

    25 April 2026

    Porsche is adding an all-electric Cayenne coupe to its lineup

    24 April 2026

    Tesla’s Q1 revenue rises, driven by EV sales and FSD subscriptions

    24 April 2026

    Tesla withdraws Musk’s $29 billion ‘interim’ award after Delaware court restores bigger pay package

    23 April 2026

    Elon Musk Admits Millions of Tesla Owners Need Upgrades for True ‘Full Self-Driving’

    23 April 2026
  • Venture

    India’s Snabbit is seeking fresh funding at a $400 million valuation, sources say

    25 April 2026

    ComfyUI hits $500M valuation as creators seek more control over AI-generated media

    25 April 2026

    The first StrictlyVC of 2026 starts in one week in San Francisco

    23 April 2026

    Esther and Anne Wojcicki support new healthcare accelerator, fund

    23 April 2026

    Anthropic rejects VC funding that values ​​it at $800B+, for now

    16 April 2026
  • Recommended Essentials
TechTost
You are at:Home»Security»After fighting malware for decades, this cybersecurity veteran is now hacking drones
Security

After fighting malware for decades, this cybersecurity veteran is now hacking drones

techtost.comBy techtost.com4 April 202608 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
After Fighting Malware For Decades, This Cybersecurity Veteran Is Now
Share
Facebook Twitter LinkedIn Pinterest Email

Mikko Hyppönen paces back and forth across the stage, his trademark dark ponytail resting against an immaculate teal suit. An experienced speaker tries to make an important point to a room full of fellow hackers and security researchers at one of the industry’s global annual meetings.

“I often call it ‘cyber security Tetris,'” he tells the audience with a serious face, tossing aside the rules of the classic video game. When you complete an entire row of bricks, the row disappears, letting the remaining bricks fall into a new row.

“So your successes disappear, while your failures pile up,” he tells the audience during his keynote address at Black Hat in Las Vegas in 2025. “The challenge we face as cybersecurity people is that our work is invisible… when you do your job perfectly, the end result is that nothing happens.”

Hyppönen’s work, however, was certainly not invisible. As one of the longest-standing players in the cybersecurity industry, it has spent more than 35 years fighting malware. When it started in the late 1980s, the term “malware” was still far from everyday language. Instead, the terms were computer “virus” or “trojans”. The Internet was still something few people had access to, and some viruses relied on infecting computers with floppy disks.

Since then, Hyppönen estimated that he has analyzed thousands of different types of malware. And thanks to his frequent speaking engagements at conferences around the world, he has become one of the most recognizable faces and respected voices in the cybersecurity community.

While Hyppönen has spent much of his life trying to prevent malware from getting into places it shouldn’t, he’s now still doing much of the same, albeit in a slightly different way: His new challenge is protecting people from drones.

Hyppönen, who is Finnish, told me during a recent interview that he lives about two hours away from Finland’s border with Russia. An increasingly hostile Russia and its 2022 full-scale invasion of Ukraine, where the majority of deaths reportedly from unmanned aerial attacks, have led Hyppönen to believe he can make a renewed impact fighting drones.

For Hyppönen, it’s also a matter of recognizing that while there are still lingering problems to be solved in the cybersecurity world — malware isn’t going anywhere and there are plenty of new problems on the horizon — the industry has made huge strides in the past two decades. An iPhone, as Hyppönen cited as an example, is an extremely secure device. The cybersecurity aspects of drone warfare, on the other hand, remain largely uncharted territory.

Image Credits:courtesy of Mikko Hypponen

From viruses and worms to malware and spyware…

Hyppönen got an early start in cybersecurity by hacking video games during the 1980s. His love of cybersecurity came from reverse engineering software to find a way to remove hacking protection from a Commodore 64 home computer. He learned to code by developing adventure games and honed his reverse engineering skills by analyzing malware at his first job at Finnish company Data Fellows, which later became the well-known antivirus manufacturer F-Secure.

Since then, Hyppönen has been at the forefront of the fight against malware, monitoring its evolution.

In the early years, virus writers developed their malicious code often purely out of passion and curiosity to see what was possible with code alone. While there was some cyber espionage, hackers had not yet discovered ways to monetize hacking by today’s standards, such as ransomware attacks. There was no cryptocurrency to facilitate extortion, no criminal market for stolen data.

Form.Afor example, it was one of the most common viruses in the early 1990s, infecting computers with floppy disks. One version of this virus didn’t destroy anything — sometimes just showing a message on the person’s screen, and that was it. But the virus traveled around the world, including landing at research stations at the South Pole, Hyppönen told me.

Hyppönen recounted the infamous ILOVEYOU viruswhich he and his colleagues first discovered in 2000. ILOVEYOU was wormable, meaning it spread automatically from computer to computer. It arrived via email as a text file, it was supposed to be a love letter. If the target opened it, it would overwrite and destroy some files on the person’s computer and then send itself to all their contacts.

The virus infected over 10 million Windows computers worldwide.

Malware has changed dramatically since then. Virtually no one develops malware as a hobby, and creating self-replicating malware is practically a guarantee that it will be caught by cybersecurity defenders who can quickly neutralize it and potentially catch its author.

Nobody does it for the love of the game anymore, according to Hyppönen. “The era of viruses is firmly behind us,” he said.

We now rarely see self-propagating worms — with rare exceptions, such as the devastating WannaCry ransomware attack from North Korea in 2017 and the massive NotPetya hacking campaign launched by Russia later that year, which brought down much of the Ukrainian internet and power grid. Now, the malware is used almost exclusively by cybercriminals, spies, and mercenary spyware developers who develop government-sponsored hacking and espionage exploits. These groups usually stay in the shadows and want to keep their tools hidden in order to continue their operations and avoid cybersecurity defenders or law enforcement.

The other differences today is that the cybersecurity industry is now estimated to be worth $250 billion. The industry has professionalized, partly out of necessity, to combat the rise of malware attacks. Defenders have gone from giving away their software for free to turning it into a paid service or product, Hyppönen said.

Computers and newer inventions like smartphones, which started to take off in the early 2000s, have become much more difficult to hack. If the tools to hack an iPhone or the Chrome browser cost six figures or even a few million dollars, Hyppönen argued, that actually makes an exploit so expensive that only the wealthy, such as governments, can use them, rather than financially motivated cybercriminals. This is a huge win for consumers and for the cybersecurity industry it’s a job well done.

a photo of a younger Mikko Hyppönen, wearing a blue shirt and tie, in a purple chair, legs up and a laptop with stickers on his lap.
Image Credits:courtesy of Mikko Hypponen

From fighting spies and criminals… to dealing with drones

In mid-2025, Hyppönen turned from cyber security to a different kind of defense work. He became the chief researcher at Sensofusion, a Helsinki-based company developing an anti-drone system for law enforcement and the military.

Hyppönen told me he was motivated to enter a burgeoning new industry because of what he saw happening in Ukraine, a war defined by drones. As a Finnish citizen, serving in the military reserves (“I can’t tell you what I do, but I can tell you they don’t give me a rifle because I’m much more destructive with the keyboard,” he tells me) and with two grandfathers who fought the Russians, Hyppönen is well aware of the presence of an enemy on the border just above his country.

“The situation is very, very important to me,” he tells me. “It’s more important to work on combating drones, not just the drones we see today, but the drones of tomorrow,” he said. “We’re on the side of humans against machines, which sounds a bit like science fiction, but that’s very specifically what we do.”

The cyber security and drone industries may seem different from each other, but there are clear parallels between the fight against malware and the fight against drones, according to Hyppönen. To combat malware, cybersecurity companies have come up with mechanisms, known as signatures, to determine what is and isn’t malware and then detect and block it. In the case of drones, Hyppönen explained, defenses include building systems that can detect and block radio-guided drones and by identifying frequencies used to control autonomous vehicles.

Hyppönen explained that it is possible to track and trace the drones by recording their radio frequencies, known as their IQ samples.

“We detect the protocol from there and create signatures to detect unknown drones,” he said.

He also explained that if you trace the protocol and frequencies used to control the drone, you can also try to carry out cyber attacks against it. You can cause the drone’s system to malfunction and crash the drone into the ground. “So in many ways, these protocol-level attacks are much, much easier in the drone world because the first step is the last step,” Hyppönen said. “If you find a vulnerability, you’re done.”

The anti-malware and anti-drone strategy isn’t the only thing that hasn’t changed in his life. The cat-and-mouse game of learning how to stop a threat, and then the enemy learning from it and devising new ways to overcome defenses, and so on, is the same in the world of drones. And then there is the identity of the enemy.

“I spent much of my career fighting against Russian malware attacks,” he said. “I’m now fighting Russian drone attacks.”

computer virus cyber security cybercrime Cybersecurity decades drones fighting Hacking malware Mikko Hypponen Russia Spyware Veteran virus
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNomadic raises $8.4 million to untangle the data pouring out of autonomous vehicles
Next Article Peter Thiel’s big bet on solar-powered cow collars
bhanuprakash.cg
techtost.com
  • Website

Related Posts

UK government says 100 countries have spyware that can hack people’s phones

25 April 2026

Surveillance vendors caught abusing telecom access to track people’s phone locations, investigators say

25 April 2026

Another spyware maker was caught distributing fake Android tracking apps

24 April 2026
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

UK government says 100 countries have spyware that can hack people’s phones

25 April 2026

Why Tokyo is the most important tech destination of 2026

25 April 2026

India’s Snabbit is seeking fresh funding at a $400 million valuation, sources say

25 April 2026
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

Steve Ballmer slams founder he backed, who pleaded guilty to fraud: ‘I was cheated and I feel stupid’

25 April 2026

Salmon raises $100 million in equity and debt to bring digital credit to unbanked Filipinos

24 April 2026

Cash App targets a new type of customer: children aged 6 to 12 years

22 April 2026
Startups

Why Tokyo is the most important tech destination of 2026

From Stage to Future: Where Are Startup Battlefield Alumni Now?

Don’t stop hiring people – stop hiring the wrong people, says Artisan founder

© 2026 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.