Mikko Hypponen
Mikko Hypponen
Mikko Hermanni Hyppönenis a computer security expert and columnist...
NationalityAmerican
ProfessionScientist
CountryUnited States of America
attack computer hours online sleeping target
There is no need to have your computer online 24 hours (a day) as a target of an attack when you are sleeping or away from your computer.
bad believe boys fact less people seeing situation targeted virus
We are seeing less of the big virus outbreaks such as Sasser and Blaster, and so some people believe the situation is getting better, when in fact it is getting worse. The bad boys are getting more professional and doing more targeted attacks.
cloud computer legal mobile operating popular rest states systems target united uses using web
The United States has an unfair advantage, as most of the popular cloud services, search engines, computer and mobile operating systems or web browsers are made by U.S. companies. When the rest of the world uses the net, they are effectively using U.S.-based services, making them a legal target for U.S. intelligence.
against attacks avoid banking created great products protect targeted truth
The truth is, consumer-grade antivirus products can't protect against targeted malware created by well-resourced nation-states with bulging budgets. They can protect you against run-of-the-mill malware: banking trojans, keystroke loggers and e-mail worms. But targeted attacks like these go to great lengths to avoid antivirus products on purpose.
ask asks bank fake fooled gets money moves next problem says target
The target is fooled into logging into a fake bank, where they ask for his authorization code. The fake bank logs into the real bank with the one-time password and moves money around. Then it gets back to the customer, says there has been a problem and asks him to give the next code.
countries foreigners gathering global legal nobody private rights services states target time united using visibility
Foreigners like me have no privacy rights whatsoever. Yet we keep using U.S.-based services all the time, making us a legal target for gathering and storing our private information. Other countries do surveillance as well. But nobody has the global visibility that United States does.
attacks buddy click dozens exploits files image messenger people seen send several since spam tries users using worm
We have seen dozens of different attacks using this vulnerability since Dec. 27. One exploits image files and tries to get users to click on them; another is an MSN Messenger worm that will send the worm to people on your buddy list, and we have seen several spam attacks.
alarming appears biggest build competing gangs infected network rate three turning virus worms
There appears to be three different virus writing gangs turning out new worms at an alarming rate -- as if they would be competing who would build the biggest network of infected machines.
cause detect enter hand intended machines nor politics regardless source
We want to detect malware, regardless of its source or purpose. Politics don't even enter the discussion, nor should they. Any malware, even targeted, can get out of hand and cause 'collateral damage' to machines that aren't the intended victim.
check clicking convincing fairly site surfing
Everything would look fairly convincing if they did some surfing to check out the site before clicking on the link. But they would still get burned.
believe blame break cycle everybody found microsoft next patch release soon test wanting widespread worm
Everybody would like to see the patch as soon as possible, but I can't blame Microsoft for wanting to test it thoroughly. However, if a widespread worm is found before next Tuesday, I do believe they will break the cycle and just release the patch.
computers happened running testing virus
As the virus is not new it's 2 years old this could only have happened if those testing computers were not running any anti-virus programs,
attacks aware moment
At the moment we are not aware of any attacks that would have used this vulnerability.
far files infected locations machines none trying
We've been monitoring the locations of the files that infected machines are now trying to download. So far none of them have activated.