article thumbnail

Crooks target US universities with malware used by nation-state actors

Security Affairs

Hupigon is a remote access Trojan (RAT) that has been active since at least 2006, it was first detected by FireEye in 2010. ‘This campaign delivered over 150,000 messages to over 60 different industries, with 45% focused on education, colleges, and universities,” Proofpoint concluded.

Phishing 333
article thumbnail

Crooks target US universities with malware used by nation-state actors

Security Affairs

Hupigon is a remote access Trojan (RAT) that has been active since at least 2006, it was first detected by FireEye in 2010. ‘This campaign delivered over 150,000 messages to over 60 different industries, with 45% focused on education, colleges, and universities,” Proofpoint concluded.

Phishing 261
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How we ended up in an era of intentional ignorance

WIRED Threat Level

“…instead of this promised blossoming of the modern mind, instead of education in an instant, we snapped our fingers and got entertainment, a medium without prerequisites, perplexity, and exposition.” Here’s a six-month old essay about online media that resonated with me for a couple of reasons. Definitely.

Education 100
article thumbnail

SHARED INTEL: How ransomware evolved from consumer trickery to deep enterprise hacks

The Last Watchdog

The Archiveus Trojan from 2006 was the first one to use RSA cipher, but it was reminiscent of a proof of concept and used a static 30-digit decryption password that was shortly cracked. The above-mentioned AIDS Trojan hailing from the distant pre-Internet era was the progenitor of the trend, but its real-world impact was close to zero.

article thumbnail

Architectures of Control: Harvard, Facebook, and the Chicago School

John Battelle's Searchblog

Early in Lessig’s “ Code v2 ,” which at some point this week I hope to review in full, Lessig compares the early campus networks of two famous educational institutions. He wrote the original Code in 1999, and updated it in 2006. Like most universities, Harvard and Chicago provided Internet access to their students.

Education 103
article thumbnail

SHARED INTEL: Mobile apps are riddled with security flaws, many of which go unremediated

The Last Watchdog

Also, WhiteHat has been generating this report annually since 2006. You’ve got to go down to a fundamental level, which is educating your developers. You need to put in place a system that helps scale this remediation, at the same pace as new applications come up and more vulnerabilities are found.

Security 170
article thumbnail

AIIM's Information Management Training - Cost, Options, and FAQs

AIIM

But we didn’t really formalize our educational programs until 2006 when we released the AIIM Enterprise Content Management (ECM) and Electronic Records Management (ERM) courses. and I delivered the first-ever public workshop in January 2006 in San Francisco, CA.

ECM 143