Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Universities Get Schooled by Hackers
Newest First  |  Oldest First  |  Threaded View
ThomasMaloney
50%
50%
ThomasMaloney,
User Rank: Apprentice
1/14/2019 | 2:11:45 AM
Lax in security
It is not really that shocking to know that educational institutions have a higher tendency to be lax in their security measures as compared to organisations from various other fields. This is because of the nature of their operations which is considered to be less risky in comparison against other sectors like finance. This makes them even more vulnerable to attacks which usually come unexpectedly.
Joseph Castro
50%
50%
Joseph Castro,
User Rank: Apprentice
1/6/2019 | 11:19:48 PM
Overall Changes
By now, every school system should not be running on old technology. As stated, level of attacks is growing. They're becoming more sophisticated, and schools need to be on top of it. This also requires a good security team with skills to support them. Too many don't pay attention, get comfortable or aren't following basic procedures. Of course, you can't be 100% secured, but if higher education security is still a problem, something is wrong here. Budget shouldn't be the reason either. Colleges and Universities make so much money! If so, this leads to even more than just a security problem. As for students, they should have security awareness training while their attending college. It should be part of their curriculum and required to pass it. In my experience, I deal with users without any decent knowledge. For example, passwords are still weak, mind sets are still on "I will never get hacked" mode, and so many more! The lack of awareness and training carries over. Again, there needs to be change and those with higher voices can make this happen.
ChristopherJames
50%
50%
ChristopherJames,
User Rank: Strategist
1/6/2019 | 8:51:08 PM
Expensive Upgrades
I think the problem here is that universities don't have the money to keep upgrading their systems. I don't think it's because they don't want to keep their facilities protected, but the price that's involved in maintaining the network is very high! Unless they can source the protection to some computing studies students....


COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/1/2020
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-6868
PUBLISHED: 2020-06-01
ZTE's PON terminal product is impacted by the access control vulnerability. Due to the system not performing correct access control on some program interfaces, an attacker could use this vulnerability to tamper with the program interface parameters to perform unauthenticated operations. This affects...
CVE-2020-7659
PUBLISHED: 2020-06-01
reel through 0.6.1 allows Request Smuggling attacks due to incorrect Content-Length and Transfer encoding header parsing. It is possible to conduct HTTP request smuggling attacks by sending the Content-Length header twice. Furthermore, invalid Transfer Encoding headers were found to be parsed as val...
CVE-2020-4019
PUBLISHED: 2020-06-01
The file editing functionality in the Atlassian Companion App before version 1.0.0 allows local attackers to have the app run a different executable in place of the app's cmd.exe via a untrusted search path vulnerability.
CVE-2020-4020
PUBLISHED: 2020-06-01
The file downloading functionality in the Atlassian Companion App before version 1.0.0 allows remote attackers, who control a Confluence Server instance that the Companion App is connected to, execute arbitrary .exe files via a Protection Mechanism Failure.
CVE-2020-4021
PUBLISHED: 2020-06-01
Affected versions are: Before 8.5.5, and from 8.6.0 before 8.8.1 of Atlassian Jira Server and Data Center allow remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the XML export view.