University of Wisconsin hacked, 75,000 social security numbers at risk


75,000 students and staff of the University of Wisconsin - Milwaukee (UWM) woke up today to learn that their social security numbers may have been accessed by an unauthorized third party. Technology staff stumbled upon a malware program hidden in the university's database server that is used to store important student information as well as research data. The malicious program had the ability to access and forward information to an off-campus location.

UWM's vice chancellor Tom Luljak made the announcement, and speculated that the perpetrators might have actually been looking for data and findings from the school's various research projects. The database that is thought to have been compromised was used to store scanned documents from a number of UWM's departments, as well as student applications. These applications are the schools top concern at this point, as they contain a plethora of information on students both past and present.
Computer forensics experts are working closely with the school to determine the source of the malware and hunt down the party or parties responsible. No data loss has been confirmed thus far, but the full results of the investigation won't be available for another month and a half. Luljak notes that UWM is doing everything it can to ease the minds of those whose data may have been obtained, saying "Our responsibility, we believe, is to be completely transparent to those affected."



4G,1,A/B Testing,2,Aerospace Engineering,2,AFP Consortium,1,Agile,2,AI,4,amazon,4,Amazon india coupons,3,AMD,1,Analytics,2,android,24,android phones,1,Anonymous,3,Antivirus,1,app,21,apple,30,apps,5,Artificial Intelligence,7,Assurance,1,asus,1,Audi,2,auto,7,automation,1,automation software,8,automotive technology,11,banking,1,Big data,1,bitcoin,2,BlackBerry,5,blockchain,3,blogging,1,BMW,1,branding,1,brands,2,browser,2,Business,17,Business Analytics,1,Business lesson,16,Business models,6,business strategy,20,Business Strategy Model,14,Business Success Story,6,business techniques,21,cameraphone,5,car,15,car technology,11,CES,1,chromebook,3,Cloud computing,6,cloud Technology,5,CMS,1,coding,1,companies,3,Consortium,1,consulting,1,content marketing,9,corporate,1,coupons,3,CRM,2,CRM Software,2,cryptocurrency,1,Customer experience,8,Customer Service,7,customer support,4,cyber crime,5,cyber security,24,data,3,data recovery,1,deals,1,Dell Streak,1,development,4,devices,2,DevOps,1,digital currency,1,digital marketing,20,Digital Transformation,2,disk,1,e commerce,1,eBay,1,ebook,1,ecommerce,7,Electric Cars,11,electronics sale,2,elon musk,2,email,1,energy,1,enterprise,9,enterprise technology,7,entrepreneur,3,entrepreneurship,7,ERP,2,facebook,24,file conversion,1,financial tech,1,firefox,2,firefox os,2,Flipkart,2,future business,8,future technology,32,gadget,33,gamail,1,games,6,Games.,1,google,20,google cars,1,google glass,3,Google I/O,1,Google+,8,goole ranking,1,Graphics Card,1,Green energy,1,hackers,17,hacking,10,hardware,5,Hosting,3,How To Guides,21,How Tos,16,icloud,3,IDE,1,Infographic,2,Information Technology,19,infosec,12,innovation,47,internet,8,Internet Explorer,1,Internet of Things,7,Inventory Management,1,ios,13,IoT,7,ipad,8,iPhone,13,iPhone 8,1,IT certification,1,IT Operation,1,IT Service,2,IT services management,3,ITSM,2,iWatch,1,Jabong,1,laptop,3,LinkedIn,2,local business,1,Lotus Notes,3,MacBook,3,mackbook air,2,Magento,1,Managed IT Services,3,Mark Zuckerberg,4,Mercedes,1,messenger,1,microsoft,6,mobile app development,20,mobile apps,25,mobile broadband,1,mobile enterprise,14,mobile recharge,2,mobility,18,mobility management,11,Motorola Xoom,1,Myntra,1,network,4,nokia,1,NSA,2,Nvidia,1,Objective-C,1,Omnichannel,1,OnePlus Smartphones,1,online course,1,online education,2,online recharge,1,online shopping,3,opreating system,5,Outlook,2,P2P,1,page ranking,1,patent,1,Payment,1,PayTM,1,pc software,1,photoshop,1,playstation,1,Porsche,1,process management,4,Procure,1,programming,3,programming language,4,Quality,2,Redbus,1,remote control,1,renewable energy,3,review,10,SAAS,4,sales,2,Sales Funnel,2,samsung,7,scrum,1,search engine,3,Search Engine Optimization,1,security,13,Self Driving Cars,11,SEO,8,smartphone,13,SME,1,sms,1,Snapdeal,2,social media,10,social network,10,software,13,Software as a service (SaaS),4,software development,5,software methodology,3,software review,1,Solar,1,Solar energy,1,Solar power,1,startup,10,steve jobs,3,storage,1,strategy,1,Supercars,1,sustainability,1,Swift,1,tablet,9,team management,1,tech,4,tech conference,1,Tech event,2,Ted talk,1,Tesla,2,Tesla Motors,3,timeline,1,toolbar,1,tools,2,torrent,1,touchscreen,2,trdx,1,tutorial,2,twitter,3,udacity,1,udemy,1,ultrabook,1,USB,1,video,1,video editor,1,virtual phone,1,Virtual Reality,2,Volvo,2,VPN,3,VR,1,Wearable gadget,2,Wearable Tech,2,Web 4.0,1,Web Development,2,web technology,6,Wi-Fi,1,wikileaks,2,windows,7,windows 10,1,Windows 8,8,Windows 8 Preview,1,Wordpress,1,workplace,1,X Mountain Lion,2,xcode,1,xp,1,
TechFond - Latest Technology | Analysis | Enterprise | Startups | Product Reviews | How Tos: University of Wisconsin hacked, 75,000 social security numbers at risk
University of Wisconsin hacked, 75,000 social security numbers at risk
TechFond - Latest Technology | Analysis | Enterprise | Startups | Product Reviews | How Tos
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy