{"id":3109040,"date":"2026-04-04T06:00:00","date_gmt":"2026-04-04T13:00:00","guid":{"rendered":"https:\/\/techcrunch.com\/?p=3109040"},"modified":"2026-04-06T12:49:03","modified_gmt":"2026-04-06T19:49:03","slug":"after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones","status":"publish","type":"post","link":"https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/","title":{"rendered":"After fighting malware for decades, this cybersecurity veteran is now hacking drones"},"content":{"rendered":"\n<p id=\"speakable-summary\" class=\"wp-block-paragraph\">Mikko Hypp\u00f6nen is pacing back and forth on the stage, with his trademark dark blond ponytail resting on an impeccable teal suit. A seasoned speaker, he is trying to make an important point to a room full of fellow hackers and security researchers at one of the industry&#8217;s global annual meetups.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cI often call this &#8216;cybersecurity Tetris,'&#8221; he tells the audience with a serious face, rattling off the rules of the classic video game. When you complete a whole line of bricks, the row vanishes, leaving the rest of the bricks to fall into a new line.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">&#8220;So your successes disappear, while your failures pile up,\u201d he tells the audience <a href=\"https:\/\/www.youtube.com\/watch?v=H14EhT-DRJ8\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">during his keynote<\/a> at Black Hat in Las Vegas in 2025. \u201cThe challenge we face as cybersecurity people is that our work is invisible\u00a0\u2026 when you do your job perfectly, the end result is that nothing happens.\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Hypp\u00f6nen\u2019s work, however, has certainly not been invisible. As one of the industry&#8217;s longest serving cybersecurity figures, he has spent more than 35 years fighting malware. When he started in the late 1980s, the term &#8220;malware&#8221; was still far from everyday parlance; the terms instead were computer &#8220;virus&#8221; or &#8220;trojans.&#8221; The internet was still something few people had access to, and some viruses relied on infecting computers with <a href=\"https:\/\/techcrunch.com\/2010\/04\/26\/sony-to-stop-manufacturing-floppy-discs-after-30-years\/\" target=\"_blank\" rel=\"noreferrer noopener\">floppy disks<\/a>.\u00a0<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Since then, Hypp\u00f6nen estimated he has analyzed thousands of different kinds of malware. And thanks to his frequent talks at conferences all over the world, he has become one of the most recognizable faces and respected voices of the cybersecurity community.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">While Hypp\u00f6nen has spent much of his life trying to keep malware from getting into places it is not supposed to, now he is still doing much of the same, albeit a slightly different tack: His new challenge is to protect people against drones.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Hypp\u00f6nen, who is Finnish, told me during a recent interview that he lives about two hours away from Finland&#8217;s border with Russia. An increasingly hostile Russia and its 2022 full-scale invasion of Ukraine, where <a href=\"http:\/\/politico.eu\/article\/latvian-report-drones-are-mass-killers-on-the-ukraine-front\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">the majority of deaths<\/a> have reportedly come from unmanned aerial attacks, have made Hypp\u00f6nen believe he can have renewed impact by fighting drones.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">For Hypp\u00f6nen, it is also a matter of recognizing that while there are still long-standing problems to solve in the world of cybersecurity \u2014 malware is not going anywhere and there are plenty of new problems on the horizon \u2014 the industry has made huge strides over the last two decades. An iPhone, Hypp\u00f6nen brought up as an example, is an extremely secure device. The cybersecurity aspects of drone warfare, on the other hand, remain almost uncharted territory.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikko-hypponnen-1.jpeg\" alt=\"a younger Mikko Hypp\u00f6nen surrounded by computers.\" class=\"wp-image-3109291\" srcset=\"https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikko-hypponnen-1.jpeg 1024w, https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikko-hypponnen-1.jpeg?resize=150,113 150w, https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikko-hypponnen-1.jpeg?resize=300,225 300w, https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikko-hypponnen-1.jpeg?resize=768,576 768w, https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikko-hypponnen-1.jpeg?resize=680,510 680w, https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikko-hypponnen-1.jpeg?resize=430,323 430w, https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikko-hypponnen-1.jpeg?resize=720,540 720w, https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikko-hypponnen-1.jpeg?resize=900,675 900w, https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikko-hypponnen-1.jpeg?resize=800,600 800w, https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikko-hypponnen-1.jpeg?resize=668,501 668w, https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikko-hypponnen-1.jpeg?resize=500,375 500w, https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikko-hypponnen-1.jpeg?resize=823,617 823w, https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikko-hypponnen-1.jpeg?resize=708,531 708w, https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikko-hypponnen-1.jpeg?resize=50,38 50w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><span class=\"wp-block-image__credits\"><strong>Image Credits:<\/strong>courtesy of Mikko Hypp\u00f6nen<\/span><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-from-viruses-and-worms-to-malware-and-spyware\">From viruses and worms to malware and spyware\u2026<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Hypp\u00f6nen started early in cybersecurity by hacking video games during the 1980s. His love for cybersecurity came from reverse-engineering software to figure out a way to remove anti-piracy protections from a Commodore 64 home computer. He learned to code by developing adventure games and sharpened his reverse-engineering skills by analyzing malware at his first job at Finnish company Data Fellows, which later became the well-known antivirus maker F-Secure.\u00a0<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Since then, Hypp\u00f6nen has been on the front lines of the fight against malware, witnessing how it evolved.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In the early years, virus writers developed their malicious code often exclusively out of passion and curiosity to see what was possible with code alone. While some cyberespionage existed, hackers had yet to discover ways to monetize hacking by today&#8217;s standards, like ransomware attacks. There was no cryptocurrency to facilitate extortion, nor a criminal marketplace for stolen data.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/www.f-secure.com\/v-descs\/form.shtml\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Form<\/a>, for example, was one of the most common viruses in the early 1990s, which infected computers with a floppy disk. A version of that virus did not destroy anything \u2014 sometimes just displaying a message on the person&#8217;s screen, and that was it. But the virus traveled around the world, including landing on the research stations at the South Pole, Hypp\u00f6nen told me.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Hypp\u00f6nen recounted the infamous <a href=\"https:\/\/www.kaspersky.com\/blog\/cybersecurity-history-iloveyou\/45001\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">ILOVEYOU virus<\/a>, which he and his colleagues were the first to discover in 2000. ILOVEYOU was wormable, meaning it spread automatically from computer to computer. It arrived via email as a text file, purportedly a love letter. If the target opened it, it would overwrite and corrupt some files on the person&#8217;s computer, and then send itself to all their contacts.\u00a0<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The virus infected over 10 million Windows computers worldwide.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Malware has changed dramatically since then. Virtually no one develops malware as a hobby, and creating malicious software that self-replicates is practically a guarantee that it will get caught by cybersecurity defenders capable of neutralizing it quickly and potentially catching its author.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">No one does it for the love of the game anymore, according to Hypp\u00f6nen. \u201cThe age of viruses is firmly behind us,\u201d he said.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Seldom do we now see self-spreading worms \u2014 with rare exceptions, such as the destructive <a href=\"https:\/\/techcrunch.com\/2019\/07\/08\/the-wannacry-sinkhole\/\" target=\"_blank\" rel=\"noreferrer noopener\">WannaCry ransomware attack<\/a> by North Korea in 2017, and the NotPetya mass-hacking campaign <a href=\"https:\/\/techcrunch.com\/2020\/10\/19\/justice-department-russian-hackers-notpetya-ukraine\/\">launched by Russia<\/a> later that year, which crippled much of the Ukrainian internet and power grid. Now, malware is almost exclusively used by cybercriminals, spies, and mercenary spyware makers who develop exploits for government-backed hacking and espionage. Those groups typically stay in the shadows and want to keep their tools hidden to continue their activities and to avoid cybersecurity defenders or law enforcement.\u00a0<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The other differences today are that the cybersecurity industry is now estimated to be worth $250 billion. The industry has professionalized, in part as a necessity, to fight the increase in malware attacks. Defenders went from giving away their software for free to turning it into a paid service or product, said Hypp\u00f6nen.\u00a0<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Computers and newer inventions like smartphones, which began to take off during the early 2000s, have become much harder to hack. If the tools to hack an iPhone or the Chrome browser cost six figures or even a few million dollars, Hypp\u00f6nen argued, this effectively makes an exploit so expensive that only the highly resourced, like governments, can use them, rather than financially motivated cybercriminals. That\u2019s a huge win for consumers, and for the cybersecurity industry that\u2019s a job well done.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"1200\" src=\"https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikkohypponen-2.jpeg\" alt=\"a photo of a younger Mikko Hypp\u00f6nen, wearing a blue shirt and tie, on a purple chair, with his feet up and a laptop with stickers on his lap.\" class=\"wp-image-3109292\" srcset=\"https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikkohypponen-2.jpeg 1600w, https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikkohypponen-2.jpeg?resize=150,113 150w, https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikkohypponen-2.jpeg?resize=300,225 300w, https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikkohypponen-2.jpeg?resize=768,576 768w, https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikkohypponen-2.jpeg?resize=680,510 680w, https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikkohypponen-2.jpeg?resize=1200,900 1200w, https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikkohypponen-2.jpeg?resize=1280,960 1280w, https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikkohypponen-2.jpeg?resize=430,323 430w, https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikkohypponen-2.jpeg?resize=720,540 720w, https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikkohypponen-2.jpeg?resize=900,675 900w, https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikkohypponen-2.jpeg?resize=800,600 800w, https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikkohypponen-2.jpeg?resize=1536,1152 1536w, https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikkohypponen-2.jpeg?resize=668,501 668w, https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikkohypponen-2.jpeg?resize=500,375 500w, https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikkohypponen-2.jpeg?resize=823,617 823w, https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikkohypponen-2.jpeg?resize=708,531 708w, https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/mikkohypponen-2.jpeg?resize=50,38 50w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><figcaption class=\"wp-element-caption\"><span class=\"wp-block-image__credits\"><strong>Image Credits:<\/strong>courtesy of Mikko Hypp\u00f6nen<\/span><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-from-fighting-spies-and-criminals-to-countering-drones\">From fighting spies and criminals\u00a0\u2026 to countering drones<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">In mid-2025, Hypp\u00f6nen pivoted from cybersecurity to a different kind of defensive work. He became the chief research officer at Sensofusion, a Helsinki-based company that develops an anti-drone system for law enforcement agencies and the military.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Hypp\u00f6nen told me that was what motivated him to get into drone security, a developing new industry, because of what he saw happening in Ukraine, a war defined by drones. As a Finnish citizen, who serves in the military reserves (\u201cI can&#8217;t tell you what I do, but I can tell you that they don&#8217;t give me a rifle because I&#8217;m much more destructive with a keyboard,\u201d he tells me), and with two grandfathers who fought the Russians, Hypp\u00f6nen is acutely aware of the presence of an enemy just over his country&#8217;s border.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cThe situation is very, very important to me,&#8221; he tells me. &#8220;It&#8217;s more meaningful to work fighting against drones, not just the drones that we see today, but also the drones of tomorrow,\u201d he said. \u201cWe&#8217;re on the side of humans against machines, which sounds a little bit like science fiction, but that&#8217;s very concretely what we do.\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The cybersecurity and drone industries may seem leagues apart from one another, but there are clear parallels between fighting malware and fighting drones, according to Hypp\u00f6nen. To fight malware, cybersecurity companies have come up with mechanisms, known as signatures, to identify what is malware and what is not and then detect and block it. In the case of drones, Hypp\u00f6nen explained, defenses involve building systems that can locate and jam radio drones, and by recognizing frequencies that are being used to control the autonomous vehicles.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Hypp\u00f6nen explained that it\u2019s possible to identify and detect drones by recording their radio frequencies, known as their IQ samples.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cWe detect the protocol from there and build up signatures for detecting unknown drones,\u201d he said.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">He also explained that if you detect the protocol and frequencies used to control the drone, you can also try to conduct cyberattacks against it. You can cause the drone&#8217;s system to malfunction, and crash the drone into the ground. \u201cSo in many ways, these protocol-level attacks are much, much easier in the drone world because the first step is the last step,\u201d Hypp\u00f6nen said. \u201cIf you find a vulnerability, you&#8217;re done.\u201d<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The strategy in fighting malware and fighting drones is not the only thing that hasn\u2019t changed in his life. The cat-and-mouse game of learning how to stop a threat, and then the enemy learning from that and devising new ways to get around defenses, and on and on, is the same in the world of drones. And then, there\u2019s the identity of the enemy.&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u201cI spent a big part of my career fighting against Russian malware attacks,\u201d he said. \u201cNow I&#8217;m fighting Russian drone attacks.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mikko Hypp\u00f6nen is one of the most recognizable faces of the cybersecurity industry. After fighting computer viruses, worms, and malware, for more than 35 years, he tells TechCrunch why he is now working on systems to stop killer drones. <\/p>\n","protected":false},"author":133574594,"featured_media":3109046,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"tc-featured-article":true,"tc-header-option":"","tc-breaking-news":false,"tc-article-brief":false,"carmot_uuid":"","apple_news_api_created_at":"2026-04-04T13:00:23Z","apple_news_api_id":"3d52941c-28cf-4898-ae33-bf7b93e3564f","apple_news_api_modified_at":"2026-04-06T19:49:02Z","apple_news_api_revision":"AAAAAAAAAAAAAAAAAAAABQ==","apple_news_api_share_url":"https:\/\/apple.news\/APVKUHCjPSJiuM797k-NWTw","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":[],"apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"tc_subtitle":"","tc_featured_image_disabled":false,"tc_exclude_from_rss_feed":false,"tc_exclude_from_content_rivers":false,"footnotes":""},"categories":[21587494],"tags":[137903,15593,10759,5448,6827,568167,965824,51751,15778901],"tc_region":[],"tc_event":[],"tc_storyline_tax":[],"coauthors":[577104450],"class_list":["post-3109040","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-drones","tag-malware","tag-russia","tag-spyware","tag-virus","tag-computer-virus","tag-cybersecurity","tag-cybercrime","tag-mikko-hypponen"],"apple_news_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.1 (Yoast SEO v25.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch<\/title>\n<meta name=\"description\" content=\"Mikko Hypp\u00f6nen is one of the most recognizable faces of the cybersecurity industry. After fighting computer viruses, worms, and malware, for more than 35 years, he tells TechCrunch why he is now working on systems to stop killer drones.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch\" \/>\n<meta property=\"og:description\" content=\"Mikko Hypp\u00f6nen is one of the most recognizable faces of the cybersecurity industry. After fighting computer viruses, worms, and malware, for more than 35 years, he tells TechCrunch why he is now working on systems to stop killer drones.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/\" \/>\n<meta property=\"og:site_name\" content=\"TechCrunch\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/techcrunch\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-04T13:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-06T19:49:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/Mikko-Hypponen-Black-Hat-USA-2025.jpg?resize=1200,891\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"891\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lorenzo Franceschi-Bicchierai\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TechCrunch\" \/>\n<meta name=\"twitter:site\" content=\"@TechCrunch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lorenzo Franceschi-Bicchierai\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/\"},\"author\":{\"name\":\"Lorenzo Franceschi-Bicchierai\",\"@id\":\"https:\/\/techcrunch.com\/#\/schema\/person\/ae6736172fc69d49ba9b3d836e93d029\"},\"headline\":\"After fighting malware for decades, this cybersecurity veteran is now hacking drones\",\"datePublished\":\"2026-04-04T13:00:00+00:00\",\"dateModified\":\"2026-04-06T19:49:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/\"},\"wordCount\":1543,\"publisher\":{\"@id\":\"https:\/\/techcrunch.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/Mikko-Hypponen-Black-Hat-USA-2025.jpg\",\"keywords\":[\"drones\",\"malware\",\"russia\",\"Spyware\",\"Virus\",\"computer virus\",\"cybersecurity\",\"cybercrime\",\"mikko hypponen\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2026\",\"copyrightHolder\":{\"@id\":\"https:\/\/techcrunch.com\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/\",\"url\":\"https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/\",\"name\":\"After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch\",\"isPartOf\":{\"@id\":\"https:\/\/techcrunch.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/Mikko-Hypponen-Black-Hat-USA-2025.jpg\",\"datePublished\":\"2026-04-04T13:00:00+00:00\",\"dateModified\":\"2026-04-06T19:49:03+00:00\",\"description\":\"Mikko Hypp\u00f6nen is one of the most recognizable faces of the cybersecurity industry. After fighting computer viruses, worms, and malware, for more than 35 years, he tells TechCrunch why he is now working on systems to stop killer drones.\",\"breadcrumb\":{\"@id\":\"https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/#primaryimage\",\"url\":\"https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/Mikko-Hypponen-Black-Hat-USA-2025.jpg\",\"contentUrl\":\"https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/Mikko-Hypponen-Black-Hat-USA-2025.jpg\",\"width\":4000,\"height\":2970,\"caption\":\"Cybersecurity expert Mikko Hypponen speaks at the Black Hat USA cybersecurity conference on August 6, 2025 in Las Vegas, Nevada. (Image: Black HAt USA 2025)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/techcrunch.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"After fighting malware for decades, this cybersecurity veteran is now hacking drones\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/techcrunch.com\/#website\",\"url\":\"https:\/\/techcrunch.com\/\",\"name\":\"TechCrunch\",\"description\":\"Startup and Technology News\",\"publisher\":{\"@id\":\"https:\/\/techcrunch.com\/#organization\"},\"alternateName\":\"TC\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/techcrunch.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/techcrunch.com\/#organization\",\"name\":\"TechCrunch\",\"alternateName\":\"TC\",\"url\":\"https:\/\/techcrunch.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/techcrunch.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/techcrunch.com\/wp-content\/uploads\/2018\/04\/tc-logo-2018-square-reverse2x.png?resize=1200,1200\",\"contentUrl\":\"https:\/\/techcrunch.com\/wp-content\/uploads\/2018\/04\/tc-logo-2018-square-reverse2x.png?resize=1200,1200\",\"width\":1200,\"height\":1200,\"caption\":\"TechCrunch\"},\"image\":{\"@id\":\"https:\/\/techcrunch.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/techcrunch\",\"https:\/\/x.com\/TechCrunch\",\"https:\/\/mstdn.social\/@TechCrunch\",\"https:\/\/bsky.app\/profile\/techcrunch.com\",\"https:\/\/www.threads.net\/@techcrunch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/techcrunch.com\/#\/schema\/person\/ae6736172fc69d49ba9b3d836e93d029\",\"name\":\"Lorenzo Franceschi-Bicchierai\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/techcrunch.com\/#\/schema\/person\/image\/e5c2a45b56c8d08b18a46cf3571af0fc\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/675be9c00f9239b767b25cc470ba3878e035e319722e04170747562fd77e0d42?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/675be9c00f9239b767b25cc470ba3878e035e319722e04170747562fd77e0d42?s=96&d=identicon&r=g\",\"caption\":\"Lorenzo Franceschi-Bicchierai\"},\"url\":\"https:\/\/techcrunch.com\/author\/lorenzo-franceschi-bicchierai\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch","description":"Mikko Hypp\u00f6nen is one of the most recognizable faces of the cybersecurity industry. After fighting computer viruses, worms, and malware, for more than 35 years, he tells TechCrunch why he is now working on systems to stop killer drones.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/","og_locale":"en_US","og_type":"article","og_title":"After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch","og_description":"Mikko Hypp\u00f6nen is one of the most recognizable faces of the cybersecurity industry. After fighting computer viruses, worms, and malware, for more than 35 years, he tells TechCrunch why he is now working on systems to stop killer drones.","og_url":"https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/","og_site_name":"TechCrunch","article_publisher":"https:\/\/www.facebook.com\/techcrunch","article_published_time":"2026-04-04T13:00:00+00:00","article_modified_time":"2026-04-06T19:49:03+00:00","og_image":[{"width":1200,"height":891,"url":"https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/Mikko-Hypponen-Black-Hat-USA-2025.jpg?resize=1200,891","type":"image\/jpeg"}],"author":"Lorenzo Franceschi-Bicchierai","twitter_card":"summary_large_image","twitter_creator":"@TechCrunch","twitter_site":"@TechCrunch","twitter_misc":{"Written by":"Lorenzo Franceschi-Bicchierai","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/#article","isPartOf":{"@id":"https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/"},"author":{"name":"Lorenzo Franceschi-Bicchierai","@id":"https:\/\/techcrunch.com\/#\/schema\/person\/ae6736172fc69d49ba9b3d836e93d029"},"headline":"After fighting malware for decades, this cybersecurity veteran is now hacking drones","datePublished":"2026-04-04T13:00:00+00:00","dateModified":"2026-04-06T19:49:03+00:00","mainEntityOfPage":{"@id":"https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/"},"wordCount":1543,"publisher":{"@id":"https:\/\/techcrunch.com\/#organization"},"image":{"@id":"https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/#primaryimage"},"thumbnailUrl":"https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/Mikko-Hypponen-Black-Hat-USA-2025.jpg","keywords":["drones","malware","russia","Spyware","Virus","computer virus","cybersecurity","cybercrime","mikko hypponen"],"articleSection":["Security"],"inLanguage":"en-US","copyrightYear":"2026","copyrightHolder":{"@id":"https:\/\/techcrunch.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/","url":"https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/","name":"After fighting malware for decades, this cybersecurity veteran is now hacking drones | TechCrunch","isPartOf":{"@id":"https:\/\/techcrunch.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/#primaryimage"},"image":{"@id":"https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/#primaryimage"},"thumbnailUrl":"https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/Mikko-Hypponen-Black-Hat-USA-2025.jpg","datePublished":"2026-04-04T13:00:00+00:00","dateModified":"2026-04-06T19:49:03+00:00","description":"Mikko Hypp\u00f6nen is one of the most recognizable faces of the cybersecurity industry. After fighting computer viruses, worms, and malware, for more than 35 years, he tells TechCrunch why he is now working on systems to stop killer drones.","breadcrumb":{"@id":"https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/#primaryimage","url":"https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/Mikko-Hypponen-Black-Hat-USA-2025.jpg","contentUrl":"https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/Mikko-Hypponen-Black-Hat-USA-2025.jpg","width":4000,"height":2970,"caption":"Cybersecurity expert Mikko Hypponen speaks at the Black Hat USA cybersecurity conference on August 6, 2025 in Las Vegas, Nevada. (Image: Black HAt USA 2025)"},{"@type":"BreadcrumbList","@id":"https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/techcrunch.com\/"},{"@type":"ListItem","position":2,"name":"After fighting malware for decades, this cybersecurity veteran is now hacking drones"}]},{"@type":"WebSite","@id":"https:\/\/techcrunch.com\/#website","url":"https:\/\/techcrunch.com\/","name":"TechCrunch","description":"Startup and Technology News","publisher":{"@id":"https:\/\/techcrunch.com\/#organization"},"alternateName":"TC","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/techcrunch.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/techcrunch.com\/#organization","name":"TechCrunch","alternateName":"TC","url":"https:\/\/techcrunch.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/techcrunch.com\/#\/schema\/logo\/image\/","url":"https:\/\/techcrunch.com\/wp-content\/uploads\/2018\/04\/tc-logo-2018-square-reverse2x.png?resize=1200,1200","contentUrl":"https:\/\/techcrunch.com\/wp-content\/uploads\/2018\/04\/tc-logo-2018-square-reverse2x.png?resize=1200,1200","width":1200,"height":1200,"caption":"TechCrunch"},"image":{"@id":"https:\/\/techcrunch.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/techcrunch","https:\/\/x.com\/TechCrunch","https:\/\/mstdn.social\/@TechCrunch","https:\/\/bsky.app\/profile\/techcrunch.com","https:\/\/www.threads.net\/@techcrunch"]},{"@type":"Person","@id":"https:\/\/techcrunch.com\/#\/schema\/person\/ae6736172fc69d49ba9b3d836e93d029","name":"Lorenzo Franceschi-Bicchierai","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/techcrunch.com\/#\/schema\/person\/image\/e5c2a45b56c8d08b18a46cf3571af0fc","url":"https:\/\/secure.gravatar.com\/avatar\/675be9c00f9239b767b25cc470ba3878e035e319722e04170747562fd77e0d42?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/675be9c00f9239b767b25cc470ba3878e035e319722e04170747562fd77e0d42?s=96&d=identicon&r=g","caption":"Lorenzo Franceschi-Bicchierai"},"url":"https:\/\/techcrunch.com\/author\/lorenzo-franceschi-bicchierai\/"}]}},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"After fighting malware for decades, this cybersecurity veteran is now hacking drones","url":"https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/"},"thumbnailUrl":"https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/Mikko-Hypponen-Black-Hat-USA-2025.jpg?w=150","image":{"@type":"ImageObject","url":"https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/Mikko-Hypponen-Black-Hat-USA-2025.jpg"},"articleSection":"Security","author":[{"@type":"Person","name":"Lorenzo Franceschi-Bicchierai"}],"creator":["Lorenzo Franceschi-Bicchierai"],"publisher":{"@type":"Organization","name":"TechCrunch","logo":"https:\/\/techcrunch.com\/wp-content\/uploads\/2015\/02\/cropped-cropped-favicon-gradient.png"},"keywords":["drones","malware","russia","spyware","virus","computer virus","cybersecurity","cybercrime","mikko hypponen"],"dateCreated":"2026-04-04T13:00:00Z","datePublished":"2026-04-04T13:00:00Z","dateModified":"2026-04-06T19:49:03Z"},"rendered":"<meta name=\"parsely-title\" content=\"After fighting malware for decades, this cybersecurity veteran is now hacking drones\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/techcrunch.com\/2026\/04\/04\/after-fighting-malware-for-decades-this-cybersecurity-veteran-is-now-hacking-drones\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/Mikko-Hypponen-Black-Hat-USA-2025.jpg?w=150\" \/>\n<meta name=\"parsely-pub-date\" content=\"2026-04-04T13:00:00Z\" \/>\n<meta name=\"parsely-section\" content=\"Security\" \/>\n<meta name=\"parsely-tags\" content=\"drones,malware,russia,spyware,virus,computer virus,cybersecurity,cybercrime,mikko hypponen\" \/>\n<meta name=\"parsely-author\" content=\"Lorenzo Franceschi-Bicchierai\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/techcrunch.com\/p.js"},"jetpack_featured_media_url":"https:\/\/techcrunch.com\/wp-content\/uploads\/2026\/04\/Mikko-Hypponen-Black-Hat-USA-2025.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/posts\/3109040","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/users\/133574594"}],"replies":[{"embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/comments?post=3109040"}],"version-history":[{"count":17,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/posts\/3109040\/revisions"}],"predecessor-version":[{"id":3109798,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/posts\/3109040\/revisions\/3109798"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/media\/3109046"}],"wp:attachment":[{"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/media?parent=3109040"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/categories?post=3109040"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/tags?post=3109040"},{"taxonomy":"tc_region","embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/tc_region?post=3109040"},{"taxonomy":"tc_event","embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/tc_event?post=3109040"},{"taxonomy":"tc_storyline_tax","embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/tc_storyline_tax?post=3109040"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/coauthors?post=3109040"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}