System vulnerability at Conn. state university may have exposed student data
Western Connecticut State University does not believe the records of 233,880 people were inappropriately accessed
IDG News Service - Western Connecticut State University said Thursday that a vulnerability in its computer system present for more than three years may have exposed the data of 233,880 students and other people affiliated with the institution.
The vulnerability has now been fixed, and it is not believed that the system was inappropriately accessed, the university said. The data exposed included names, addresses, Social Security numbers and financial account information supplied by prospective students when applying to the university as well as lists of SAT scores bought by the school. The university said buying test scores is a common practice in higher education.
"Since discovery of the exposure, the university has dramatically increased its information protection capacity with new layers of protection," the school said. "The university will continue to assess and improve all aspects of its information security."
The information exposed dated back to 1999. The vulnerability was present in the system between April 2009 through September this year. The university did not describe the vulnerability in its news release.
WCSU is offering two years of credit monitoring to those affected from the company AllClear ID. A It has also set up a web-based form where people can enter their last name and the last four digits of their Social Security number to see if their data was exposed.
The university notified the office of the Attorney General Connecticut of the problem.
Send news tips and comments to email@example.com. Follow me on Twitter: @jeremy_kirk
- Step Out of the Bull's-Eye Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily... All Cybercrime and Hacking White Papers | Webcasts