Campus Security :: July 13, 2007

Security Spotlight

Who Knows What Evil Lurks in the Cyber Heart?
The Hackers Know. (Apologies to The Shadow.)
By Doug Gale
Universities don't become headlines because a $2,000 computer is hacked or lost. They become headlines when sensitive information such as Social Security numbers, credit card numbers, and medical information is stolen. In terms of liability, the asset is not equipment; it is information....

Campus Security News

Cardiff U Identity Project Widens Access to Campus Systems
Cardiff University in Wales is leading an effort to persuade universities across the U.K. to share research on each other's campus online activity as a way help fight online fraud, hackers, and malicious software attacks....
FBI, Carnegie Mellon Identify 1 MM BotNet Nodes
The FBI and Carnegie Mellon University's Computer Emergency Response Team (CERT) have identified the IP addresses of more than 1 million zombie computers throughout the United States as a part of security sweep nicknamed "Operation Bot Roast."...
U Maryland Goes Global With Net Security Lab in Japan
University of Maryland's University College is working with Cisco Systems to open up a string of university-based network security labs around the planet....
U Michigan Team Recommends Anti-Virus Overhaul
A report by researchers at the University of Michigan's electrical engineering and computer science department concluded that anti-virus products are inconsistent when it comes to identifying worm, phishing, and botnet attacks....
Indiana U Draws New Tool Against Cyber Crime
Researchers at the Indiana University School of Informatics are turning to popular mass media tools to help get through to the public about computer security dos and don'ts....
University of Texas Project To Train Health-Emergency Responders
The University of Texas Health Science Center at Houston has formed a partnership with a simulation software firm to develop Web-based content for training staff in emergency response procedures....
UC Santa Barbara Prof Studies Psychology of Phishing
Most e-mail scams work by luring victims with a sense of familiarity or legitimacy, according to a new study by a University of California, Santa Barbara psychologist....
Campus Messaging System Upgrades Continue Apace
Colleges and universities around the country are continuing to rapidly adopt or upgrade their electronic and wireless messaging systems for campus emergency alerts in the wake of the Virginia Tech mass murder....

Coming Up

AACRAO Technology Conference: "Applying Technology to Student Services"
Minneapolis, MN, July 15-July 17, 2007
Campus Technology 2007
Washington, DC, July 30-August 2, 2007
United States Crime Prevention Through Environmental Design Conference (CPTED) 2007
Las Vegas, NV, August 1, 2007
Find More Events...

Featured

  • futuristic crystal ball with holographic data projections

    Call for Opinions: 2025 Predictions for Higher Ed IT

    How will the technology landscape in higher education change in the coming year? We're inviting our readership to weigh in with their predictions, wishes, or worries for 2025.

  • cloud icon connected to a data network with an alert symbol (a triangle with an exclamation mark) overlaying the cloud

    U.S. Department of Commerce Proposes Mandatory Reporting Requirement for AI, Cloud Providers

    This proposed rule from the department's Bureau of Industry and Security aims to enhance national security by establishing reporting requirements for the development of advanced AI models and computing clusters.

  • person signing a bill at a desk with a faint glow around the document. A tablet and laptop are subtly visible in the background, with soft colors and minimal digital elements

    California Governor Signs AI Content Safeguards into Law

    California Governor Gavin Newsom has officially signed off on a series of landmark artificial intelligence bills, signaling the state’s latest efforts to regulate the burgeoning technology, particularly in response to the misuse of sexually explicit deepfakes. The legislation is aimed at mitigating the risks posed by AI-generated content, as concerns grow over the technology's potential to manipulate images, videos, and voices in ways that could cause significant harm.

  • glowing AI symbol integrated into a stylized cloud icon, surrounded by interconnected digital nodes and translucent security shields, set against a gradient white-to-blue background with grid lines and abstract risk charts

    Cloud Security Alliance Report Plots Path to Trustworthy AI

    A new report from the Cloud Security Alliance highlights the need for AI audits that extend beyond regulatory compliance, and advocates for a risk-based, comprehensive methodology designed to foster trust in rapidly evolving intelligent systems.