Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

Instructure strikes against hackers who breached it twice

Research repository ArXiv will ban authors for a year if they let AI do all the work

WhatsApp adds an incognito feature to Meta AI chats

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    Research repository ArXiv will ban authors for a year if they let AI do all the work

    17 May 2026

    OpenAI launches ChatGPT for personal finance, it will let you connect bank accounts

    16 May 2026

    Silicon Valley vacation land needs a new energy provider as artificial intelligence raises prices

    16 May 2026

    Runway started by helping filmmakers. Now he wants to beat Google in artificial intelligence.

    15 May 2026

    What the jury will really decide in the case of Elon Musk v. Sam Altman

    15 May 2026
  • Apps

    WhatsApp adds an incognito feature to Meta AI chats

    17 May 2026

    Instagram’s new ‘Instants’ feature combines elements from Snapchat and BeReal

    16 May 2026

    How to disable Instagram’s new Instants feature and recall accidentally shared photos

    16 May 2026

    Osaurus brings both local and cloud AI models to your Mac

    15 May 2026

    Spotify will adopt Apple’s new video podcast technology, offering creators easier cross-platform distribution

    15 May 2026
  • Crypto

    As crypto cools, a16z crypto raises $2.2 billion in capital

    6 May 2026

    Coinbase to lay off 14% of staff as part of broader restructuring

    5 May 2026

    British cryptographer Adam Back denies NYT report that he is Bitcoin creator Satoshi Nakamoto

    9 April 2026

    Hackers stole over $2.7 billion in crypto in 2025, data shows

    23 December 2025

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025
  • Fintech

    Venmo’s biggest makeover in years comes at a very interesting time

    11 May 2026

    Fintech startup Parker files for bankruptcy

    10 May 2026

    Robinhood’s venture fund IPO attracted 150,000+ private investors, CEO says

    7 May 2026

    PayPal says it’s “becoming a tech company again” — that’s AI

    6 May 2026

    Stripe introduces Link, a digital wallet that autonomous AI agents can also use

    1 May 2026
  • Hardware

    Users are turning to jailbreaking their older Kindles as Amazon ends support

    17 May 2026

    Cerebras raises $5.5 billion, then shares soar to $108, first huge tech IPO of 2026

    15 May 2026

    Google unveils Googlebook, a new line of laptops with native artificial intelligence

    13 May 2026

    The Instax Wide 400 takes the simplicity of instant photography and expands it, literally

    10 May 2026

    Google Unveils Fitbit Air Without Whoop-like Display

    8 May 2026
  • Media & Entertainment

    YouTube viewers watch 2 billion hours of Shorts on TV every month

    14 May 2026

    Digg is trying again, this time as an AI news aggregator

    12 May 2026

    Bravo creates unscripted mini-dramas for the Peacock app

    11 May 2026

    The hottest place for startups to strike a deal? The F1 mantra

    10 May 2026

    Netflix delays Greta Gerwig’s ‘Narnia’ for big theatrical push to 2027

    2 May 2026
  • Security

    Instructure strikes against hackers who breached it twice

    17 May 2026

    US lawmakers demand answers from Instructure after Canvas data breaches

    16 May 2026

    US orders Air Force One travelers to throw away gifts, pins and cellphones after trip to China

    16 May 2026

    A hotel check-in system left a million passports and driving licenses open for anyone to see

    15 May 2026

    A spyware researcher exposed Russian government hackers trying to break into Signal accounts

    15 May 2026
  • Startups

    Clio’s $500 million milestone comes just as Anthropic steps up to first stage

    15 May 2026

    Startup Battlefield 200 applications close on May 27

    14 May 2026

    Anduril Raises $5B, Doubles Valuation To $61B

    13 May 2026

    Korea’s biggest manufacturers support Config, TSMC robot data

    11 May 2026

    China’s Moonshot AI Raises $2B in $20B Valuation as Demand for Open Source AI Soars

    10 May 2026
  • Transportation

    Tesla Reveals Two Robotaxi Accidents With Remote Controls

    16 May 2026

    RJ Scaringe has raised more than $12 billion in three startups, and investors still want more

    16 May 2026

    Indian Uber rival Rapido raises $240 million at $3 billion valuation

    15 May 2026

    Uber to open 2 campuses in India to support product development and operations

    14 May 2026

    Rep. Jeff Bezos steps down from Slate Auto board

    14 May 2026
  • Venture

    General Catalyst posted VC rage bait and it worked, especially on a16z

    16 May 2026

    Meridian Ventures Raises $35M Fund to Back MBA-Deferred Founders

    15 May 2026

    Cerebras’ IPO earns Benchmark billions, but VC Eric Vishria almost didn’t get the meeting

    15 May 2026

    Khosla Ventures bets $10 million on Ian Crosby, whose last startup, Bench, collapsed

    14 May 2026

    Anthropic warns investors against secondary platforms offering access to its shares

    13 May 2026
  • Recommended Essentials
TechTost
You are at:Home»Security»After fighting malware for decades, this cybersecurity veteran is now hacking drones
Security

After fighting malware for decades, this cybersecurity veteran is now hacking drones

techtost.comBy techtost.com4 April 202608 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
After Fighting Malware For Decades, This Cybersecurity Veteran Is Now
Share
Facebook Twitter LinkedIn Pinterest Email

Mikko Hyppönen paces back and forth across the stage, his trademark dark ponytail resting against an immaculate teal suit. An experienced speaker tries to make an important point to a room full of fellow hackers and security researchers at one of the industry’s global annual meetings.

“I often call it ‘cyber security Tetris,'” he tells the audience with a serious face, tossing aside the rules of the classic video game. When you complete an entire row of bricks, the row disappears, letting the remaining bricks fall into a new row.

“So your successes disappear, while your failures pile up,” he tells the audience during his keynote address at Black Hat in Las Vegas in 2025. “The challenge we face as cybersecurity people is that our work is invisible… when you do your job perfectly, the end result is that nothing happens.”

Hyppönen’s work, however, was certainly not invisible. As one of the longest-standing players in the cybersecurity industry, it has spent more than 35 years fighting malware. When it started in the late 1980s, the term “malware” was still far from everyday language. Instead, the terms were computer “virus” or “trojans”. The Internet was still something few people had access to, and some viruses relied on infecting computers with floppy disks.

Since then, Hyppönen estimated that he has analyzed thousands of different types of malware. And thanks to his frequent speaking engagements at conferences around the world, he has become one of the most recognizable faces and respected voices in the cybersecurity community.

While Hyppönen has spent much of his life trying to prevent malware from getting into places it shouldn’t, he’s now still doing much of the same, albeit in a slightly different way: His new challenge is protecting people from drones.

Hyppönen, who is Finnish, told me during a recent interview that he lives about two hours away from Finland’s border with Russia. An increasingly hostile Russia and its 2022 full-scale invasion of Ukraine, where the majority of deaths reportedly from unmanned aerial attacks, have led Hyppönen to believe he can make a renewed impact fighting drones.

For Hyppönen, it’s also a matter of recognizing that while there are still lingering problems to be solved in the cybersecurity world — malware isn’t going anywhere and there are plenty of new problems on the horizon — the industry has made huge strides in the past two decades. An iPhone, as Hyppönen cited as an example, is an extremely secure device. The cybersecurity aspects of drone warfare, on the other hand, remain largely uncharted territory.

Image Credits:courtesy of Mikko Hypponen

From viruses and worms to malware and spyware…

Hyppönen got an early start in cybersecurity by hacking video games during the 1980s. His love of cybersecurity came from reverse engineering software to find a way to remove hacking protection from a Commodore 64 home computer. He learned to code by developing adventure games and honed his reverse engineering skills by analyzing malware at his first job at Finnish company Data Fellows, which later became the well-known antivirus manufacturer F-Secure.

Since then, Hyppönen has been at the forefront of the fight against malware, monitoring its evolution.

In the early years, virus writers developed their malicious code often purely out of passion and curiosity to see what was possible with code alone. While there was some cyber espionage, hackers had not yet discovered ways to monetize hacking by today’s standards, such as ransomware attacks. There was no cryptocurrency to facilitate extortion, no criminal market for stolen data.

Form.Afor example, it was one of the most common viruses in the early 1990s, infecting computers with floppy disks. One version of this virus didn’t destroy anything — sometimes just showing a message on the person’s screen, and that was it. But the virus traveled around the world, including landing at research stations at the South Pole, Hyppönen told me.

Hyppönen recounted the infamous ILOVEYOU viruswhich he and his colleagues first discovered in 2000. ILOVEYOU was wormable, meaning it spread automatically from computer to computer. It arrived via email as a text file, it was supposed to be a love letter. If the target opened it, it would overwrite and destroy some files on the person’s computer and then send itself to all their contacts.

The virus infected over 10 million Windows computers worldwide.

Malware has changed dramatically since then. Virtually no one develops malware as a hobby, and creating self-replicating malware is practically a guarantee that it will be caught by cybersecurity defenders who can quickly neutralize it and potentially catch its author.

Nobody does it for the love of the game anymore, according to Hyppönen. “The era of viruses is firmly behind us,” he said.

We now rarely see self-propagating worms — with rare exceptions, such as the devastating WannaCry ransomware attack from North Korea in 2017 and the massive NotPetya hacking campaign launched by Russia later that year, which brought down much of the Ukrainian internet and power grid. Now, the malware is used almost exclusively by cybercriminals, spies, and mercenary spyware developers who develop government-sponsored hacking and espionage exploits. These groups usually stay in the shadows and want to keep their tools hidden in order to continue their operations and avoid cybersecurity defenders or law enforcement.

The other differences today is that the cybersecurity industry is now estimated to be worth $250 billion. The industry has professionalized, partly out of necessity, to combat the rise of malware attacks. Defenders have gone from giving away their software for free to turning it into a paid service or product, Hyppönen said.

Computers and newer inventions like smartphones, which started to take off in the early 2000s, have become much more difficult to hack. If the tools to hack an iPhone or the Chrome browser cost six figures or even a few million dollars, Hyppönen argued, that actually makes an exploit so expensive that only the wealthy, such as governments, can use them, rather than financially motivated cybercriminals. This is a huge win for consumers and for the cybersecurity industry it’s a job well done.

a photo of a younger Mikko Hyppönen, wearing a blue shirt and tie, in a purple chair, legs up and a laptop with stickers on his lap.
Image Credits:courtesy of Mikko Hypponen

From fighting spies and criminals… to dealing with drones

In mid-2025, Hyppönen turned from cyber security to a different kind of defense work. He became the chief researcher at Sensofusion, a Helsinki-based company developing an anti-drone system for law enforcement and the military.

Hyppönen told me he was motivated to enter a burgeoning new industry because of what he saw happening in Ukraine, a war defined by drones. As a Finnish citizen, serving in the military reserves (“I can’t tell you what I do, but I can tell you they don’t give me a rifle because I’m much more destructive with the keyboard,” he tells me) and with two grandfathers who fought the Russians, Hyppönen is well aware of the presence of an enemy on the border just above his country.

“The situation is very, very important to me,” he tells me. “It’s more important to work on combating drones, not just the drones we see today, but the drones of tomorrow,” he said. “We’re on the side of humans against machines, which sounds a bit like science fiction, but that’s very specifically what we do.”

The cyber security and drone industries may seem different from each other, but there are clear parallels between the fight against malware and the fight against drones, according to Hyppönen. To combat malware, cybersecurity companies have come up with mechanisms, known as signatures, to determine what is and isn’t malware and then detect and block it. In the case of drones, Hyppönen explained, defenses include building systems that can detect and block radio-guided drones and by identifying frequencies used to control autonomous vehicles.

Hyppönen explained that it is possible to track and trace the drones by recording their radio frequencies, known as their IQ samples.

“We detect the protocol from there and create signatures to detect unknown drones,” he said.

He also explained that if you trace the protocol and frequencies used to control the drone, you can also try to carry out cyber attacks against it. You can cause the drone’s system to malfunction and crash the drone into the ground. “So in many ways, these protocol-level attacks are much, much easier in the drone world because the first step is the last step,” Hyppönen said. “If you find a vulnerability, you’re done.”

The anti-malware and anti-drone strategy isn’t the only thing that hasn’t changed in his life. The cat-and-mouse game of learning how to stop a threat, and then the enemy learning from it and devising new ways to overcome defenses, and so on, is the same in the world of drones. And then there is the identity of the enemy.

“I spent much of my career fighting against Russian malware attacks,” he said. “I’m now fighting Russian drone attacks.”

computer virus cyber security cybercrime Cybersecurity decades drones fighting Hacking malware Mikko Hypponen Russia Spyware Veteran virus
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNomadic raises $8.4 million to untangle the data pouring out of autonomous vehicles
Next Article Peter Thiel’s big bet on solar-powered cow collars
bhanuprakash.cg
techtost.com
  • Website

Related Posts

Instructure strikes against hackers who breached it twice

17 May 2026

US lawmakers demand answers from Instructure after Canvas data breaches

16 May 2026

US orders Air Force One travelers to throw away gifts, pins and cellphones after trip to China

16 May 2026
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

Instructure strikes against hackers who breached it twice

17 May 2026

Research repository ArXiv will ban authors for a year if they let AI do all the work

17 May 2026

WhatsApp adds an incognito feature to Meta AI chats

17 May 2026
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

Venmo’s biggest makeover in years comes at a very interesting time

11 May 2026

Fintech startup Parker files for bankruptcy

10 May 2026

Robinhood’s venture fund IPO attracted 150,000+ private investors, CEO says

7 May 2026
Startups

Clio’s $500 million milestone comes just as Anthropic steps up to first stage

Startup Battlefield 200 applications close on May 27

Anduril Raises $5B, Doubles Valuation To $61B

© 2026 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.