Permanent Links

Poll

What should be the topic for the next Impossibly Stupid poll?

A Town Square Poll Space

Tech Corner

See Also

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[TXT]README.html2014-11-29 12:38 2.9K 
[   ]info.json2014-12-09 01:41 40  
[   ]tags=logged2015-03-26 18:30 0  
[   ]tags=meta2015-03-26 18:30 0  

Spam Outings, Round 12

You know the drill by now: educational institutions enjoy leaving their networks open to any would-be identity thief or research data saboteur:

Oregon State System of Higher Education
1225 Kincaid, UO Campus
Eugene, OR 97403

spammed us on Friday, 5 March 2010 - 6:54pm via IP 140.211.15.30

University of British Columbia
6356 Agricultural Road
Vancouver, BC V6T-1Z2
CA

spammed us on Friday, 5 March 2010 - 8:45pm via IP 198.162.52.23

Kilmarnock College
Lumen House
Library Avenue
Harwell Science and Innovation Campus
DIDCOT, Oxon
OX11 0SG UK

spammed us on Friday, 5 March 2010 - 8:32pm via IP 212.219.163.212

Technical University of Vienna
Technische Universitaet Wien
Zentraler Informatik Dienst
Wiedner Hauptstrasse 8-10/020
A-1040 VIenna
Austria

spammed us on Saturday, 6 March 2010 - 12:05am via IP 128.131.167.8

Nebo School District
350 S. Main
Spanish Fork, UT 84660

spammed us on Monday, 22 February 2010 - 1:30pm via IP 160.7.244.34

Here we have a insecure network that deals double damage by making vulnerable both educational and medical information:

Medical and Educational Data Network
P.O. Box 14466
Riyadh 11424
Saudi Arabia

spammed us on Saturday, 27 February 2010 - 1:19am via IP 213.230.18.244

Government agencies in general should be more secure than these:

State of Nebraska / Office of the CIO
501 South 14th street
Lincoln, NE 68508-2711

spammed us on Thursday, 4 March 2010 - 2:47pm via IP 205.202.121.244

Illinois Century Network
120 W Jefferson
Suite B
Springfield, IL 62702

spammed us on Wednesday, 24 February 2010 - 10:03pm via IP 64.107.146.21

And, of course, we always love to feature people who tout their security expertise:

M5 Computer Security
3368 Governor Drive #F-124
San Diego, CA 92122

spammed us on Thursday, 4 March 2010 - 9:00am and Friday, 5 March 2010 - 5:37pm via IP 206.251.255.61

To be fair, that appears to be a hosting service for ifountain.org. So, unless you use their software yourself, you probably only have to be concerned if someone else who uses RapidOSS is leaking your personal data because they've been compromised. I mean, we all know what operations management software is being used by people who store our personal information, right?