Students are expelled for using keyloggers to correct scores
The University of Kansas fired a student by installing keylogger and hacking the school's score system to change its grades.
The University of Kansas fired a student by installing keylogger and hacking the school's score system to change its grades.
KU did not reveal the name of the student, only saying that the keyboard monitor was installed on a computer in the hall. This student collected data from this device and turned all F points into points A. Professors said the incident was not detected if the student was not too greedy and corrected too much.
Buy items online to make tracking devices
The device that this student uses is a keyboard tracking tool that anyone can buy on Amazon or eBay for only about $ 20. KU management board is also very angry because of the way to manage when the incident happened at the end of spring but it was not until 2 weeks before they discovered it.
Device to monitor computers and hack points
The same incident happened
This is not the first time a student hacked to change scores. In 2015, a Louisiana high school also suspended 45 students for hacking the school's scoring system. The same hack took place in other countries like China. The Technology School in Haifa, Israel fired a student in March due to hacking professor's email seeking information to increase scores.
You should read it
- Detect the keylogger preinstalled on the HP laptop driver
- How to hack Wifi passwords using Wifiphisher
- How to hack name in Among Us, naming tips Among Us
- 4 ways to hack Facebook you should know to protect your Facebook account
- Can cybercriminals use ChatGPT to hack your bank or PC?
- Top 28 Android tools and apps you should know (Part 2)
- How to Use the Grepolis Hack Tool (PRO V2)
- Here's how I hack 40 websites in 7 minutes
- How to Speed Hack or Break Through Walls in ROBLOX
- How to Hack a Website
- Top 28 Android tools and apps you should know (Part 1)
- How to Hack Ultimate Tactics
Maybe you are interested
What is PetitPotam Attack? How to overcome PetitPotam attack The Microsoft MSERT tool can find web shells related to the Exchange Server attack campaign Many encrypted SSDs can be decoded without a password Wsreset tool of Windows 10 Store was used by hackers to bypass anti-virus software The CredSSP vulnerability in the RDP protocol affects all versions of Windows Detects two serious vulnerabilities on uTorrent that can help hackers execute malicious code or view download history on your computer