{"id":43894,"date":"2022-03-10T06:37:13","date_gmt":"2022-03-10T11:37:13","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine-episode&#038;p=43894"},"modified":"2023-05-16T05:49:08","modified_gmt":"2023-05-16T09:49:08","slug":"how-university-leadership-uncovered-student-identity-theft","status":"publish","type":"emagazine-episode","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/video-series\/how-university-leadership-uncovered-student-identity-theft\/43894\/","title":{"rendered":"How university leadership uncovered student identity theft"},"content":{"rendered":"<p><span class=\"style-scope yt-formatted-string\" dir=\"auto\">One stolen staff identity \u2013 that\u2019s all it took to trick many <\/span>Royal Holloway<span class=\"style-scope yt-formatted-string\" dir=\"auto\"> University of London students into money laundering.\u00a0 The university\u2019s cybersecurity experts explain how they uncovered the identity theft and what education institutions can do to keep students safe. <\/span><\/p>\n<p><span class=\"style-scope yt-formatted-string\" dir=\"auto\">For more on protecting tomorrow, visit <\/span><a class=\"yt-simple-endpoint style-scope yt-formatted-string\" href=\"https:\/\/www.youtube.com\/redirect?event=video_description&amp;redir_token=QUFFLUhqbWtkWmxlNG1vQXpmeWhDWllnVGJtdHEtMUtSd3xBQ3Jtc0trQ2NnQ2FnZ3dHbVMwbFBJcUhJY3lOZklsNnNrX0ppYmZhRWlqaWRhMzVVN1RnbWdPSnF2NGdfUk5WMzBWOWhXYmY0SnJtT0ZEaVZ6NUZpUWR5XzUtY1hnU3d2UkNyX09RRWw2bHpaaWo2SFRJY3Z1NA&amp;q=https%3A%2F%2Fwww.tomorrowunlocked.com%2F\" target=\"_blank\" rel=\"nofollow noopener\">https:\/\/www.tomorrowunlocked.com\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>One stolen staff identity \u2013 that\u2019s all it took to trick many Royal Holloway University of London students into money laundering.\u00a0 The university\u2019s cybersecurity experts explain how they uncovered the<\/p>\n","protected":false},"author":2521,"featured_media":0,"template":"","coauthors":[3452],"class_list":["post-43894","emagazine-episode","type-emagazine-episode","status-publish"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine-episode\/43894","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine-episode"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine-episode"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2521"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=43894"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=43894"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}