University Hack Leaves Professors

University Hack Leaves Professors' Data Vulnerable

A University of Kansas student was able to use a keystroke logger to gain access to a professor's computers and change his grades.

A recent hack at the University of Kansas is creating waves at universities around the country as administrations worry that an easily found device could allow students to gain access to professors' grades and other personal information.

The hacker at KU was an engineering student with a keystroke logger, he used the device to access professors' computers and change all his failing grades to A's.

"He may have never gotten caught, but he got greedy," Ron Barrett-Gonzalez, an engineering professor at KU told The Kansas City Star. "It does look a little suspicious when you are on academic probation and the dean's honor roll at the same time."

A keystroke logger, which can be either a piece of software or a device, logs every key a person presses on a computer keyboard. The logger can capture personal messages, passwords, credit card numbers, Social Security numbers - anything the user types.

Keystroke loggers are out there and in "high demand." For under a hundred dollars, the devices (about the size of a thumb drive) can be purchased online. It can be connected to a computer in an inconspicuous manner, something attached to a cable. 

University administrators learned about the hack during the 2016-2017 school year and expelled the student, however, faculty members where not aware of the intrusion until recently when the dean of the School of Engineering brought up the hack during a meeting last week.

Barrett-Gonzalez told The Kansas City Star that he believes this could be an issue at every university and high school across the country. 

"We needed to know about this as quickly as possible so that we could take steps against this," Barrett-Gonzalez said. "I'm horrified that KU didn't get the word out to all the faculty and graduate teaching assistants."

This particular hack is frightening to all involved since the student makes an active choice to cross the line of student conduct into criminal actions. 

 

About the Author

Sydny Shepard is the Executive Editor of Campus Security & Life Safety.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.