Language Selection

English French German Italian Portuguese Spanish

USC: Applicants' Files May Have Been Read

Filed under
Security

Officials of the University of Southern California said they will contact everyone who used the school's online application system in the past eight years to warn them that a hacker may have been able to read their files.

School security officials said they plan to contact about 270,000 people although they believe the hacker looked at only about 10 files.

"Although we believe that the scope of this is pretty small, we're taking it very seriously and we are taking great care to notify every single person where there is even the potential that their records might have been viewed," said L. Katharine Harrington, USC's dean of admission and financial aid.

The hacker took advantage of a security flaw he discovered while trying to use the USC Web site on June 20, said Robert M. Wood, USC's information security officer.

However, the hacker then reported the flaw to an online security magazine, SecurityFocus, and the publication informed USC.

Wood said the FBI was notified but he doubted that any criminal case will be pursued because there didn't appear to have been any malicious attempt to obtain private information.
FBI officials would not comment.

Since the middle of last year, computer security lapses have been reported at several other schools.

Harvard University, the Massachusetts Institute of Technology and Stanford University all rejected dozens of business school applicants who tried to access admissions Web sites earlier this year in hopes of learning their fate ahead of schedule.

A former University of Texas student was indicted last fall on charges he hacked into the school's computer system and stole Social Security numbers and other personal information from more than 37,000 students and employees. California State University, Chico, had a similar incident in March.

Associated Press

More in Tux Machines

FreeBSD 10.1 Has The New VT Driver, Hardware Improvements

Released this past week was the first beta of FreeBSD 10.1. If you haven't yet had time to explore this development release, there's a lot of improvements over FreeBSD 10.0. Here's some of the features that interest us the most about this forthcoming FreeBSD 10 update: - The driver for FreeBSD's new VT console has been added. The new VT hasn't been enabled by default but for now still requires setting a special parameter. - The ported-from-Linux Radeon DRM/KMS driver now has support for 32-bit ioctls so 32-bit OpenGL applications are able to run on a 64-bit FreeBSD system. - Various hardware-related improvements from Turbo Boost enabled Intel CPUs to PowerPC 970 CPUs to Atom Silvermont to Apple books saw different changes. - Bhyve virtualization improvements. Find out more about the recent FreeBSD 10 changes via the stable release notes. FreeBSD 10.1 is expected for an official unveiling on 29 October. Read more

Android tablet records and recreates 3D scenes

Mantis Vision and Flextronics unveiled an Android-based “Aquila” tablet based on Mantis’ MV4D 3D engine that uses a 3D sensing system to recreate 3D scenes. So-called 3D tablets, which display 3D video and other content with or without special glasses, never hit it big among consumers. Now Israeli 3D vision technology firm Mantis Vision and manufacturer Flextronics have built a different kind of tablet called the Aquila. It not only displays 3D content, but records, recreates it, and lets you manipulate the image in 3D or integrate it into applications. Read more

REVIEW: How to turn a Raspberry Pi in to an NSA-proof computer

One of the Pi's key attributes is its price of around £30. It is the nearest thing we have to a disposable computer and several can be used cost-effectively in a single project. A recently publicised use is the creation of a string of Raspberry Pi honeypots for detecting hacker activity on a corporate network. Given CW's enduring preoccupation with the surveillance programs of our Establishment masters, would it be, could it be possible to create a disposable, network-invisible computer? Read more

Android L