Tuesday, March 4, 2025
HomeHacksHigh School Student Hacked School Computer System and Raise Several of His...

High School Student Hacked School Computer System and Raise Several of His Grades

Published on

SIEM as a Service

Follow Us on Google News

A Famous Tenafly High School from northern New Jersey Student hacked his school computer system and changed several of his grades and his overall GPA.

A 16-year old senior student of Tenafly High School wanted to get an admission to an Ivy League university but he wouldn’t Feel his grade is enough to get admission.

Ivy League is a group of colleges and universities in the northeastern U.S., consisting of Yale, Harvard, Princeton, Columbia, Dartmouth, Cornell, the University of Pennsylvania, and Brown, having a reputation for high scholastic achievement and social prestige.

After compromises the school computer he also sent out college applications with the allegedly doctored transcripts.

In United States education, a transcript is a copy of a student’s permanent academic record, which usually means all courses taken, all grades received, all honors received and degrees conferred to a student from the first day of school to the current school year.

Also Read: Now We Aware Who is the NSA Employee kept Top Secret and Sensitive NSA documents at Home computer

Later School officials find this alteration and scheme, suspended the student from school and rescinded his college applications.

According to northjersey ” Tenafly Police Chief Robert Chamberlain told The Record and NorthJersey.com in a telephone interview. He stressed that he could release very little information about the case because it’s an active investigation involving a juvenile”

The student name is still known and Ashley Kipiani of Wyckoff, an educator who has tutored high schoolers for more than 15 years Said, notes that the pressure to cheat is higher today as students aspire for a perfect grade point average, AP credits and a ticket into a top college.

“Cheating is also easier in today’s high tech world than it was years ago when students had to peer over their shoulders at their classmate’s test paper, or write test answers on their arms, she said. “

In a survey of over 4,000 high school students worldwide, the Santa Clara, California-based computer security firm McAfee found that more than 60 percent said they knew of other students who use electronic and mobile devices to cheat.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Bubba AI, Inc. is Launching Comp AI to Help 100,000 Startups Get SOC 2 Compliant by 2032.

With the growing importance of security compliance for startups, more companies are seeking to...

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass...

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring...

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems

A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of...