Monday, October 19, 14:13
Home security ProctorTrack deactivates its service after a breach

ProctorTrack deactivates its service after a breach

The online proctoring service ProctorTrack has disabled access to its service after violating its parent company.

With many schools and colleges conducting distance learning, including tests, online teaching services are increasingly being used to prevent students from copying.

ProctorTrack is one such solution from Verificient used by many universities, including Rutgers, University of Western Ontario, Ohio University, Illinois State University, Purdue University and WITH.

ProctorTrack

Verificient and ProctorTrack were breached

As of yesterday, students have been receiving emails sent by the hacker from Verificient support account. This e-mail contained racist content reports and falsely stated that the company and ProctorTrack had ceased operations.

To add further damage, hackers "trolled" Verificient by defacing its website company to show the video called "Never Gonna Give You Up" about Rick Astley.

Shortly afterwards, Verificient disabled ProctorTrack's service and apologized for the hackers' messages.

From the moment they received them emails and were notified of a ProctorTrack breach, students have expressed concerns about the use of the service by school their.

The source code was leaked last month

In addition to this week's hack, the Source Code for various Verificient applications leaked last week at Twitter and Telegram.

The source code was leaked by Tillie Kottman, who also leaked the source code for dozens of companies in July and the Intel source code in August. It is not known if these two violations are related.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

Teo Ehc
Teo Ehchttps://www.secnews.gr
Be the limited edition.

LIVE NEWS

System breach exposes Kleenheat customer data

Australian-based gas company Kleenheat has warned some of its customers of data breaches, which may ...

US Election: Candidates manipulate voters via email!

The politicians who are candidates for the upcoming US elections use psychological tricks and "dark" patterns in their emails to ...

Google Chrome and Edge create random debug.log logs

An error in the latest version of Chrome and other Chromium-based browsers causes random debug.log files to be created ...

TikTok: Announced bug bounty program to detect vulnerabilities

The company behind the popular video sharing application TikTok announced last week that it has launched a public bug bounty program, ...

Windows 10: Unlock God Mode and see all Settings

Windows 10 comes with the Control Panel and Settings, but the modern application of Settings has a peculiarity, the basic ...

Microsoft: Releases emergency updates to fix RCE vulnerabilities

Microsoft has released emergency security updates to address two vulnerabilities that allow remote code execution (RCE) and affect Microsoft ...

Ransomware: Your business will never be the same again after an attack

A ransomware attack can harm an organization in many ways - from stopping being able to function ...

Foxtons suffered data breach, according to a newspaper

According to a newspaper report, Foxtons allegedly fell victim to data breach, which led to the deactivation of the MyFoxtons website ...

Google: Warned of 33.000 attacks by state hackers

During the first three quarters of 2020, Google sent over 33.000 alerts to users to warn them about phishing ...

Hackers use Basecamp for phishing and malware attacks

Phishing attacks have begun exploiting Basecamp in an attempt to distribute malware and steal credentials. The Basecamp ...