Malware Captured in Art

The Museum of Malware Art captures the dark side of our digital world. Through our collections and exhibitions, we explore the history, present and future of cyber attacks: the motivations behind them, the ethical considerations of digital security and malware's effects on individuals, companies and societies. 

We are opening in Wood City 2 in

0 days
0 hours
0 minutes
0 seconds

WithSecure invites you to contribute to one of the museum's most prominent pieces: a sculpture made from crowdsourced computer mice.

This exhibit will pay homage to the infamous ILOVEYOU virus, which wreaked havoc in May 2000. By donating your old computer mice, you will contribute to a powerful piece that tells the story of one of the most notorious cyber threats in history. The sculpture aims to highlight the human element and psychological moactor malware.

Want to be a part of this sculpture and donate a computer mouse?

Here's how to donate:

  1. Package your mice (maximum 2 per donation)
  2. Mark the envelope/package clearly with the following details:
    WithSecure / MUMA,
    Tammasaarenkatu 7,
    00180 Helsinki.
  3. Send your mice!

WithSecure does not cover or reimburse any shipping, packaging or costs related to sending the mice.
The final art installation will be unveiled on November 19, 2024.

If you have any questions, please send an email to

Blending art, technology and culture, we create immersive and thought-provoking exhibitions that invite visitors to experience the world of cyber threats. Our aim is to demystify cyber threats through visible representations and serve as a platform for discussion about our roles as technology users, the importance 
 of cybersecurity in societies and how to build a safer world. 

During SPHERE24, we are unveiling our first installation of the Museum of Malware Art – Threatscape. Threatscape is an interactive installation that allows viewers to see and capture malware from near real-time WithSecure threat data with their bare hands. The work combines gesture recognition, data streams, visual programming and image diffusion models in a unique way, making previously unseen cyber threats tangible and prompting reflection on the constantly changing cyber security landscape.