article thumbnail

Crooks target US universities with malware used by nation-state actors

Security Affairs

Hupigon is a remote access Trojan (RAT) that has been active since at least 2006, it was first detected by FireEye in 2010. ‘This campaign delivered over 150,000 messages to over 60 different industries, with 45% focused on education, colleges, and universities,” Proofpoint concluded.

Phishing 133
article thumbnail

Half a million of us want to donate our data to British science, but it’s languishing unused because of privacy fears | Polly Toynbee

The Guardian Data Protection

Back in 2006, with half a million others aged between 40 and 69, I signed up to this magnificent project, the world’s most advanced genetic database. They took blood, saliva and urine, measured bone density and made notes on exercise, alcohol and family history, with social class, ethnicity, education, employment and income included.

Sales 83
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Crooks target US universities with malware used by nation-state actors

Security Affairs

Hupigon is a remote access Trojan (RAT) that has been active since at least 2006, it was first detected by FireEye in 2010. ‘This campaign delivered over 150,000 messages to over 60 different industries, with 45% focused on education, colleges, and universities,” Proofpoint concluded.

Phishing 108
article thumbnail

SHARED INTEL: How ransomware evolved from consumer trickery to deep enterprise hacks

The Last Watchdog

The Archiveus Trojan from 2006 was the first one to use RSA cipher, but it was reminiscent of a proof of concept and used a static 30-digit decryption password that was shortly cracked. The above-mentioned AIDS Trojan hailing from the distant pre-Internet era was the progenitor of the trend, but its real-world impact was close to zero.

article thumbnail

Architectures of Control: Harvard, Facebook, and the Chicago School

John Battelle's Searchblog

Early in Lessig’s “ Code v2 ,” which at some point this week I hope to review in full, Lessig compares the early campus networks of two famous educational institutions. He wrote the original Code in 1999, and updated it in 2006. Like most universities, Harvard and Chicago provided Internet access to their students.

Education 103
article thumbnail

SHARED INTEL: Mobile apps are riddled with security flaws, many of which go unremediated

The Last Watchdog

Also, WhiteHat has been generating this report annually since 2006. You’ve got to go down to a fundamental level, which is educating your developers. You need to put in place a system that helps scale this remediation, at the same pace as new applications come up and more vulnerabilities are found.

Security 170
article thumbnail

This is the old ChiefTech blog.: Avenue A | Razorfish Wiki Case Study

ChiefTech

We think it might be fun and educational to share the decision making and get some feedback too. It does some things well, a few really well and a couple terribly. So were redesigning it. With that in mind, were going to start talking about the redesign process here on the blog. style ("wikaportal" maybe?