Mikko Hypponen
Mikko Hypponen
Mikko Hermanni Hyppönenis a computer security expert and columnist...
NationalityAmerican
ProfessionScientist
CountryUnited States of America
attacks buddy click dozens exploits files image messenger people seen send several since spam tries users using worm
We have seen dozens of different attacks using this vulnerability since Dec. 27. One exploits image files and tries to get users to click on them; another is an MSN Messenger worm that will send the worm to people on your buddy list, and we have seen several spam attacks.
believe cost criminal freedom gangs loose money net online running steal trust using
I believe in the freedom of the net, but I don't believe in the freedom of the net at the cost of having these online criminal gangs running completely loose and using the freedom of the net to steal everybody's money and take away the trust we have.
cloud computer legal mobile operating popular rest states systems target united uses using web
The United States has an unfair advantage, as most of the popular cloud services, search engines, computer and mobile operating systems or web browsers are made by U.S. companies. When the rest of the world uses the net, they are effectively using U.S.-based services, making them a legal target for U.S. intelligence.
argue atom attack bomb computer nuclear offensive scientists time using
Nuclear scientists lost their innocence when we used the atom bomb for the very first time. So we could argue computer scientists lost their innocence in 2009 when we started using malware as an offensive attack weapon.
mac people run software using
If you run a Mac right now, you don't need antivirus. If you want to be safer, you should be using software that other people are not using.
countries foreigners gathering global legal nobody private rights services states target time united using visibility
Foreigners like me have no privacy rights whatsoever. Yet we keep using U.S.-based services all the time, making us a legal target for gathering and storing our private information. Other countries do surveillance as well. But nobody has the global visibility that United States does.
alarming appears biggest build competing gangs infected network rate three turning virus worms
There appears to be three different virus writing gangs turning out new worms at an alarming rate -- as if they would be competing who would build the biggest network of infected machines.
cause detect enter hand intended machines nor politics regardless source
We want to detect malware, regardless of its source or purpose. Politics don't even enter the discussion, nor should they. Any malware, even targeted, can get out of hand and cause 'collateral damage' to machines that aren't the intended victim.
check clicking convincing fairly site surfing
Everything would look fairly convincing if they did some surfing to check out the site before clicking on the link. But they would still get burned.
believe blame break cycle everybody found microsoft next patch release soon test wanting widespread worm
Everybody would like to see the patch as soon as possible, but I can't blame Microsoft for wanting to test it thoroughly. However, if a widespread worm is found before next Tuesday, I do believe they will break the cycle and just release the patch.
computers happened running testing virus
As the virus is not new it's 2 years old this could only have happened if those testing computers were not running any anti-virus programs,
attacks aware moment
At the moment we are not aware of any attacks that would have used this vulnerability.
far files infected locations machines none trying
We've been monitoring the locations of the files that infected machines are now trying to download. So far none of them have activated.
alarming appear biggest build competing gangs infected network seem three turning worms
We seem to have a botwar on our hands. There appear to be three different virus-writing gangs turning out new worms at an alarming rate, as if they would be competing who would build the biggest network of infected machines.