Personal Tech Pipeline | "College Admissions Routinely Hacked By Impatient Applicants

White Papers

Sponsor Resources

WebCasts
Free Newsletter GlossaryContact UsAbout Us
Players & CamsPhones & PDAsHome & AutoOnline

August 21, 2005

College Admissions Routinely Hacked By Impatient Applicants



Courtesy of VARBusiness

A number of prestigious colleges and universities across the country have discovered they are being hacked at an alarming rate. But the reasons behind the security breaches at the likes of Harvard and Stanford aren't the usual kinds of motives we've seen by cybercriminals and identity thieves. In fact, the hackers in these cases could be described as overanxious and even enterprising students.

In March, for example, 119 applicants to Harvard Business School hacked their way into the school's admissions system to find out if they had been accepted before the official announcements were made. That had happened to other colleges recently, but Harvard was reportedly the first to act with a zero-tolerance policy: All of the hacker applicants were rejected by the admissions office for their actions. Debates soon raged across the campus about whether the penalty was too severe for what many considered to be a crime of curiosity.

Then, just recently, Stanford dropped 41 applicants to its Graduate School of Business who had tried to access an admissions Web site to find out if they had been admitted. The Massachusetts Institute of Technology also rejected 32 applicants in a similar case, and several more colleges and universities have reported admissions-related hackings. Why so many admissions-systems hacks this spring? According to various news reports, earlier this year a hacker posted instructions on a Web site's forum on how to break into the software systems of various schools.

But as the saying goes, curiosity killed the hack.

E-mail This Story
Print This Story
Reprint This Story




Get the latest Personal Tech news, product info, and trends every week.


Related Content

  Right-click and choose Copy to extract RSS Feed URL  Personal Tech Pipeline's Main RSS Feed
  Right-click and choose Copy to extract RSS Feed URL  Personal Tech Pipeline's Blog RSS Feed

<A HREF="http://as.cmpnet.com/event.ng/Type=click&amp;FlightID=43527&amp;AdID=86369&amp;TargetID=3743&amp;Segments=1411,1892,2691,3108,3448,4526,4760&amp;Targets=1491,2625,2878,3743&amp;Values=34,46,51,63,77,85,90,100,140,222,227,399,442,645,646,659,1184,1311,1405,1431,1716,1767,1785,1798,1901,1925,1935,1936,1945,1970,2217,2299,2310,2329,2352,2678,2767,2787,2862,2878,2942,2956,3347,3385&amp;RawValues=&amp;Redirect=http://www.cmp.com/resources/res_whitepapers_main.jhtml?cid=b2b_feet" target="_top"><IMG SRC="http://i.cmpnet.com/ads/graphics/as5/ps/blank.gif" WIDTH=300 HEIGHT=250 BORDER=0></A>

Keeping Up To Date On Enterprise Server Tech?
Review our compilation of columns on server security, database software, and Linux issues.
Unleash the Power & Opportunity of Grid Computing
Experts will identify trends in grid computing, provide
examples and examine solution options.
Using Current Performance to Shape
Future Results

Hear new strategies for improving business
performance and results.

Editor's Picks

Well, Microsoft has "unfolded" its "Origami" ultra-mobile PC platform Thursday. It turned out to be a full-featured PC smaller than a tablet but bigger than a PDA. Are you impressed?
Yes! I want one!
Sort of. We'll see.
No! It's too big for a pocket and too small for real computing. What's the point?


In search of personal tech products? See our new Product Finder, where you'll find personal computing devices, communications solutions, security products, and more.



PERSONAL TECH PIPELINE MARKETPLACE (sponsored links)
Transform your IT infrastructure with IBM
Successful CIOs see IT as a prime stimulus for business innovation-and themselves as key participants in a process that develops business and IT strategies in concert. Read an executive summary and register to download the full IBM paper.

Symantec Backup Solutions
Desktop to Data Center Protection. Explore the Official Symantec Site.

SEC & HIPAA IM Compliance
Satisfy regulatory and compliance requirements for instant messaging.

Secure & Easy Console Management with Digi CM
The Digi CM console server provides secure, intelligent & easy access to network devices with a serial console port. With Digi CM, you can securely monitor & control servers, routers, switches & other devices even when your network is down.

Learn how much you save with open source.
Find out how much of a financial impact open source can have on your enterprise. Get these tools now, compliments of JBoss. Go!


Buy a Link Now


Top ten search terms from the TechWeb TechEncyclopedia
How does your pay rate? Check the InformationWeek Salary Survey
Mobilized Solutions Guide: Find and compare solutions for your business
Top Requested White Paper Categories from TechWeb White paper Library
Top ten search terms from the TechWeb TechEncyclopedia