Loyola University Chicago

- Navigation -

Loyola University Chicago

University Information Security Office

Security Articles - Staff

      Date                                                      Article Title           
Feb 2013

Educause Security Breach

A security breach involving an EDUCAUSE server may have compromised some EDUCAUSE website profile passwords. This does not affect users that log in using their InCommon credentials via Loyola.<<Read More>>

Nov 2012

Google, Microsoft, PayPal, other Romanian sites hijacked by DNS hackers

Romanian websites for Google, Microsoft, Yahoo, PayPal, and other operators were briefly redirected to a rogue server on Wednesday. The redirect is most likely a result of a decade-old hacking technique that underscores the fragility of the Internet's routing system. <<Read More>>

Nov 2012

Pro-Iranian hackers stole data from UN atomic agency's server

The United Nations' International Atomic Energy Agency has admitted that data from a retired server at its Vienna headquarters was stolen and posted to a hacker website. <<Read More>>

Aug 2012

Secure your digital self: auditing your cloud identity

We put more and more of ourselves in the cloud every day. E-mail, device settings, data synchronization between devices, and access to much of our digital selves is tied to a handful of cloud service accounts with Google, Apple, Microsoft, Dropbox, and others. As demonstrated dramatically over the last week, those accounts are easily put at risk if they’re too interconnected—especially since the weakest link in cloud security may be the employees of the providers themselves. <<Read More>>

Jan 2011

Privacy Alert: 10 Biggest Threats of 2010

2010 could go on record as the year the privacy mess hit the proverbial fan. Companies such as Apple, AT&T, Facebook, and Google all got nailed for sharing users' personal data in big ways, accidentally or otherwise. Police officers were caught tracking people's movements via cell phones, while Web advertisers tracked surfers' virtual movements via hard-to-kill cookies. Schools spied on their students, mobile apps spied on their owners, and the feds caught heat for getting a little too personal with their security searches. <<Read More>>

Dec 2010

Free vs. Fee: Free and Paid Antivirus Programs Compared

Can free antivirus software protect you? Or is it worth paying for a full-blown A/V app? We look at the benefits--and pitfalls--of free and paid antivirus products. <<Read More>>

Sep 2010

The 17 Most Dangerous Places on the Web

The scariest sites on the Net? They're not the only ones you might suspect. Here's what to watch out for and how to stay safe. <<Read More>>

 June 2010

How VPN (Virtual Private Networks) Work ?

VPN is a private network that uses a public network (usually the Internet) to connect remote sites or users together. Instead of using a dedicated, real-world connection such as leased line, a VPN uses "virtual" connections routed through the Internet from the company's private network to the remote site or employee. <<Read More>>

 July 2009

Top 10 Most Famous Hackers of All Time

Hackers are a very diverse bunch, a group simultaneously blamed with causing billions of dollars in damages as well as credited with the development of the World Wide Web and the founding of major tech companies. In this article, we test the theory that truth is better than fiction by introducing you to ten of the most famous hackers, both nefarious and heroic, to let you decide for yourself. <<Read More>>

 July 2009

The 15 Most Massive Data Breaches in History

If you're an organ donor, a welfare recipient, a student, an employee, a patient or if you do business or have an account virtually anywhere, your personal data is entrusted in the hands of strangers. These strangers have an obligation to keep information such as your date of birth, full name, address, Social Security number, phone numbers, medical records, employee records and banking information safe and confidential. However, through weak security on computer networks, theft and loss of laptops and employee negligence, much of your information can be exposed or fall into the hands of identity thieves through data breaches. Here are 15 of the largest data breaches in history in chronological order. <<Read More>>

 July 2009


Top 10 U.S. Government Web Break-ins of All Time

Since the dawn of networked computing, bored kids, foreign patriots and spy agencies have all attacked U.S. government computers. Here are some of their most noteworthy exploits, which prove that no site is so fortified that it can’t be attacked by a sufficiently motivated teenager, system administrator or Russian office worker.

<<Read More>>

 May 2009


Fax vs. Email: Which is More Secure?

When was the last time you wanted to throw your fax machine out the window? If you’re like most managers and office workers, faxes might be first on your list of Top 10 Most Annoying Machines. Half the time they don’t send correctly, or they’re busy when you try to send.  Don’t throw your fax out just yet, though. Faxing still offers some important advantages over emailing. In some ways, faxes are actually more secure than Email. <<Read More>>


Information Technology Services
1032 W. Sheridan Ave. · Chicago, IL 60660 · 773.508-7373

Notice of Non-discriminatory Policy