article thumbnail

Crooks target US universities with malware used by nation-state actors

Security Affairs

Hupigon is a remote access Trojan (RAT) that has been active since at least 2006, it was first detected by FireEye in 2010. ‘This campaign delivered over 150,000 messages to over 60 different industries, with 45% focused on education, colleges, and universities,” Proofpoint concluded.

Phishing 333
article thumbnail

Crooks target US universities with malware used by nation-state actors

Security Affairs

Hupigon is a remote access Trojan (RAT) that has been active since at least 2006, it was first detected by FireEye in 2010. ‘This campaign delivered over 150,000 messages to over 60 different industries, with 45% focused on education, colleges, and universities,” Proofpoint concluded.

Phishing 262
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How we ended up in an era of intentional ignorance

WIRED Threat Level

“…instead of this promised blossoming of the modern mind, instead of education in an instant, we snapped our fingers and got entertainment, a medium without prerequisites, perplexity, and exposition.” Here’s a six-month old essay about online media that resonated with me for a couple of reasons. Definitely.

Education 100
article thumbnail

Half a million of us want to donate our data to British science, but it’s languishing unused because of privacy fears | Polly Toynbee

The Guardian Data Protection

Back in 2006, with half a million others aged between 40 and 69, I signed up to this magnificent project, the world’s most advanced genetic database. They took blood, saliva and urine, measured bone density and made notes on exercise, alcohol and family history, with social class, ethnicity, education, employment and income included.

article thumbnail

SHARED INTEL: How ransomware evolved from consumer trickery to deep enterprise hacks

The Last Watchdog

The Archiveus Trojan from 2006 was the first one to use RSA cipher, but it was reminiscent of a proof of concept and used a static 30-digit decryption password that was shortly cracked. The above-mentioned AIDS Trojan hailing from the distant pre-Internet era was the progenitor of the trend, but its real-world impact was close to zero.

article thumbnail

Architectures of Control: Harvard, Facebook, and the Chicago School

John Battelle's Searchblog

Early in Lessig’s “ Code v2 ,” which at some point this week I hope to review in full, Lessig compares the early campus networks of two famous educational institutions. He wrote the original Code in 1999, and updated it in 2006. Like most universities, Harvard and Chicago provided Internet access to their students.

Education 103
article thumbnail

SHARED INTEL: Mobile apps are riddled with security flaws, many of which go unremediated

The Last Watchdog

Also, WhiteHat has been generating this report annually since 2006. You’ve got to go down to a fundamental level, which is educating your developers. You need to put in place a system that helps scale this remediation, at the same pace as new applications come up and more vulnerabilities are found.

Security 170