Name | Last modified | Size | Description | |
---|---|---|---|---|
Parent Directory | - | |||
tags=logged | 2023-08-06 21:04 | 0 | ||
tags=meta | 2023-08-06 21:04 | 0 | ||
info.json | 2023-08-06 21:04 | 40 | ||
README.html | 2023-08-06 21:04 | 2.9K | ||
You know the drill by now: educational institutions enjoy leaving their networks open to any would-be identity thief or research data saboteur:
Oregon State System of Higher Education
1225 Kincaid, UO Campus
Eugene, OR 97403
spammed us on Friday, 5 March 2010 - 6:54pm via IP 140.211.15.30
University of British Columbia
6356 Agricultural Road
Vancouver, BC V6T-1Z2
CA
spammed us on Friday, 5 March 2010 - 8:45pm via IP 198.162.52.23
Kilmarnock College
Lumen House
Library Avenue
Harwell Science and Innovation Campus
DIDCOT, Oxon
OX11 0SG UK
spammed us on Friday, 5 March 2010 - 8:32pm via IP 212.219.163.212
Technical University of Vienna
Technische Universitaet Wien
Zentraler Informatik Dienst
Wiedner Hauptstrasse 8-10/020
A-1040 VIenna
Austria
spammed us on Saturday, 6 March 2010 - 12:05am via IP 128.131.167.8
Nebo School District
350 S. Main
Spanish Fork, UT 84660
spammed us on Monday, 22 February 2010 - 1:30pm via IP 160.7.244.34
Here we have a insecure network that deals double damage by making vulnerable both educational and medical information:
Medical and Educational Data Network
P.O. Box 14466
Riyadh 11424
Saudi Arabia
spammed us on Saturday, 27 February 2010 - 1:19am via IP 213.230.18.244
Government agencies in general should be more secure than these:
State of Nebraska / Office of the CIO
501 South 14th street
Lincoln, NE 68508-2711
spammed us on Thursday, 4 March 2010 - 2:47pm via IP 205.202.121.244
Illinois Century Network
120 W Jefferson
Suite B
Springfield, IL 62702
spammed us on Wednesday, 24 February 2010 - 10:03pm via IP 64.107.146.21
And, of course, we always love to feature people who tout their security expertise:
M5 Computer Security
3368 Governor Drive #F-124
San Diego, CA 92122
spammed us on Thursday, 4 March 2010 - 9:00am and Friday, 5 March 2010 - 5:37pm via IP 206.251.255.61
To be fair, that appears to be a hosting service for ifountain.org. So, unless you use their software yourself, you probably only have to be concerned if someone else who uses RapidOSS is leaking your personal data because they've been compromised. I mean, we all know what operations management software is being used by people who store our personal information, right?