NEWYou tin present perceive to Fox News articles!
Elite universities similar Harvard, Princeton and Columbia walk fortunes connected research, endowment and integer infrastructure. Even then, they've go casual targets for attackers who spot monolithic databases filled with idiosyncratic accusation and donation records arsenic a goldmine. Over the past fewer months, breaches crossed Ivy League campuses person exposed the aforesaid problem. These institutions grip immense amounts of delicate data, but their interior defenses often don't lucifer the standard of what they store. That signifier brings america to Harvard's newest incident, which exposed a database of alumni, donors, immoderate students and module to hackers.
Sign up for my FREE CyberGuy Report
Get my champion tech tips, urgent information alerts, and exclusive deals delivered consecutive to your inbox. Plus, you’ll get instant entree to my Ultimate Scam Survival Guide — escaped erstwhile you articulation my CYBERGUY.COM newsletter.
CHECK IF YOUR PASSWORDS WERE STOLEN IN HUGE LEAK

Elite universities clasp monolithic troves of idiosyncratic and fiscal information that marque them irresistible targets for attackers. (Photo by Aaron M. Sprecher/Getty Images)
A telephone phishing onslaught unlocks Harvard's data
Harvard confirmed that a database tied to alumni, donors, module and immoderate students was accessed by an unauthorized party. This happened aft a telephone phishing onslaught tricked idiosyncratic into giving the attacker a mode into the system.
"On Tuesday, November 18, 2025, Harvard University discovered that accusation systems utilized by Alumni Affairs and Development were accessed by an unauthorized enactment arsenic a effect of a phone-based phishing attack," the assemblage said successful a notification posted connected its website. "The University acted instantly to region the attacker's entree to our systems and forestall further unauthorized access."
The exposed information includes idiosyncratic interaction details, donation histories and different records tied to the university's fundraising and alumni operations. For Harvard, a schoolhouse that routinely raises much than a cardinal dollars a year, this database is 1 of its astir invaluable assets, which makes the breach adjacent much serious.
This is besides the 2nd clip Harvard has had to analyse a breach successful caller months. In October, it looked into reports that its information was caught up successful a broader hacking run targeting Oracle customers. That earlier informing already showed that the schoolhouse sits successful a high-risk category. This latest breach lone confirms it.
SCAMMERS NOW IMPERSONATE COWORKERS, STEAL EMAIL THREADS IN CONVINCING PHISHING ATTACKS

Harvard’s latest breach began with a telephone phishing scam that fto an intruder entree a cardinal alumni and donor database. (Jens Büttner/picture confederation via Getty Images)
Ivy League schools are successful a increasing crisis
Harvard isn't unsocial here. Ivy League campuses person seen a question of incidents that enactment up astir back-to-back. Princeton reported connected Nov. 15 that 1 of its databases tied to alumni, donors, students and assemblage members was compromised.
The University of Pennsylvania said connected Oct. 31 that accusation systems connected to its improvement and alumni activities were accessed without permission. Columbia has been dealing with an adjacent larger fallout. A breach successful June exposed the idiosyncratic information of astir 870,000 people, including students and applicants.
These attacks amusement however universities person go predictable targets. They store identities, addresses, fiscal records and donor information. They besides tally sprawling IT systems wherever a azygous mistake, a anemic password oregon a convincing telephone telephone tin make an introduction point.
Hackers cognize this, and they onslaught repeatedly. The caller clump of Ivy League breaches suggests that attackers are mapping these environments, looking for shared weaknesses that look again and again.
NEW EMAIL SCAM USES HIDDEN CHARACTERS TO SLIP PAST FILTERS

A question of incidents crossed Ivy League campuses shows hackers are exploiting the aforesaid weaknesses again and again. (Kurt "CyberGuy" Knutsson)
7 steps you tin instrumentality to support yourself from specified information breaches
You can't halt a assemblage oregon institution from being breached, but you tin marque definite that your ain accusation is harder to exploit. These steps assistance you trim the fallout erstwhile your information ends up successful the incorrect hands.
1) Turn connected two-factor authentication (2FA)
Using 2FA gives your accounts an other furniture of security. Even if idiosyncratic steals your password successful a breach, they inactive request the one-time codification from your telephone oregon authentication app. It blocks astir casual attempts and forces attackers to enactment overmuch harder.
2) Use a password manager
A password manager creates and stores strong, unsocial passwords for each tract you use. This keeps 1 compromised password from unlocking everything else. It besides removes the accent of remembering dozens of logins, truthful you don't chopped corners.
Next, spot if your email has been exposed successful past breaches. Our No. 1 password manager prime includes a built-in breach scanner that checks whether your email code oregon passwords person appeared successful known leaks. If you observe a match, instantly alteration immoderate reused passwords and unafraid those accounts with new, unsocial credentials.
Check retired the champion expert-reviewed password managers of 2025 at Cyberguy.com
3) Reduce the idiosyncratic info floating around
You tin petition takedowns from information broker sites, delete aged accounts and trim what you stock publicly. When your accusation isn't scattered crossed the internet, attackers person a overmuch harder clip piecing unneurotic your identity.
While nary work tin warrant the implicit removal of your information from the internet, a information removal work is truly a astute choice. They aren't cheap, and neither is your privacy. These services bash each the enactment for you by actively monitoring and systematically erasing your idiosyncratic accusation from hundreds of websites. It's what gives maine bid of caput and has proven to beryllium the astir effectual mode to erase your idiosyncratic information from the internet. By limiting the accusation available, you trim the hazard of scammers cross-referencing information from breaches with accusation they mightiness find connected the acheronian web, making it harder for them to people you.
Check retired my apical picks for information removal services and get a escaped scan to find retired if your idiosyncratic accusation is already retired connected the web by visiting Cyberguy.com
Get a escaped scan to find retired if your idiosyncratic accusation is already retired connected the web: Cyberguy.com
4) Be cautious with emails, texts and calls
Phishing doesn't ever travel arsenic evident scam mail. Attackers spoof institutions, transcript their code and unit you into sharing details quickly. Slow down, verify the connection done an authoritative website oregon helpline, past decide.
The champion mode to safeguard yourself from malicious links is to person beardown antivirus bundle installed connected each your devices. This extortion tin besides alert you to phishing emails and ransomware scams, keeping your idiosyncratic accusation and integer assets safe.
Get my picks for the champion 2025 antivirus extortion winners for your Windows, Mac, Android & iOS devices astatine Cyberguy.com
5) Keep your devices afloat updated
Many attackers trust connected aged flaws successful operating systems, browsers and apps. Regular updates spot these holes and unopen down the astir communal onslaught paths. If you're idiosyncratic who delays updates, turning connected automatic updates helps.
6) Separate your online identities
Use alias email addresses for banking, education, buying and newsletters. If 1 of them gets exposed, it won't automatically springiness attackers a representation of your full integer life. It makes targeted scams overmuch harder to propulsion off, and besides stops attackers from stealing your identity. By creating email aliases, you tin support your accusation and trim spam. These aliases guardant messages to your superior address, making it easier to negociate incoming communications and debar information breaches.
For recommendations connected backstage and unafraid email providers that connection alias addresses, visit Cyberguy.com
7) Use an individuality theft extortion service
You mightiness besides privation to see an individuality theft extortion work to beryllium connected the harmless side. Identity Theft companies tin show idiosyncratic accusation similar your Social Security fig (SSN), telephone fig and email address, and alert you if it is being sold connected the acheronian web oregon being utilized to unfastened an account. They tin besides assistance you successful freezing your slope and recognition paper accounts to forestall further unauthorized usage by criminals.
See my tips and champion picks connected however to support yourself from individuality theft astatine Cyberguy.com
Kurt's cardinal takeaway
Harvard's latest breach adds to a increasing database of cyberattacks that amusement however susceptible apical universities person become. Even the astir well-funded institutions aren't keeping gait with modern threats. When a elemental telephone phishing telephone tin unfastened the doorway to delicate information tied to donors, alumni and students, it's wide that these campuses request stronger defenses and much proactive monitoring. Until that happens, you tin expect much headlines similar this and much investigations aft the harm is already done.
Do you spot universities to support the idiosyncratic information you've shared with them? Let america cognize by penning to america astatine Cyberguy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report Get my champion tech tips, urgent information alerts, and exclusive deals delivered consecutive to your inbox. Plus, you’ll get instant entree to my Ultimate Scam Survival Guide — escaped erstwhile you articulation my CYBERGUY.COM newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
Kurt "CyberGuy" Knutsson is an award-winning tech writer who has a heavy emotion of technology, cogwheel and gadgets that marque beingness amended with his contributions for Fox News & FOX Business opening mornings connected "FOX & Friends." Got a tech question? Get Kurt’s escaped CyberGuy Newsletter, stock your voice, a communicative thought oregon remark astatine CyberGuy.com.











English (CA) ·
English (US) ·
Spanish (MX) ·