
Indiana University Company Cyber Security Posture
iu.eduIndiana University has nine total campuses: IU Bloomington, IU East, IU Kokomo, IU Northwest, IUPUI, IU Southeast, IU South Bend, IUPUC, and IU Fort Wayne.
Indiana University Company Details
indiana-university
1423 employees
37484.0
611
Higher Education
iu.edu
Scan still pending
IND_1322738
In-progress

Between 800 and 900
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Indiana University Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 800 and 900 |
Indiana University Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Indiana University | Breach | 50 | 2 | 4/2025 | IND000040425 | Link | |
Rankiteo Explanation : Attack limited on finance or reputationDescription: Indiana University potentially faced a data privacy incident involving Professor Xiaofeng Wang, who had been accused of not properly disclosing research funding from China. The university questioned Wang about a grant from 2017-2018 that he didn't report correctly, which could affect ongoing research and federal grant applications. There's an implication of research misconduct, which may have an impact on IU's reputation and integrity, especially in the handling of international research collaborations and compliance with federal regulations. | |||||||
Indiana University | Breach | 100 | 7 | 3/2025 | IND000040525 | Link | |
Rankiteo Explanation : Attack that could injure or kill peopleDescription: A notable incident involving Xiaofeng Wang, a distinguished computer scientist and tenured professor at Indiana University, has occurred. Following an unexplained disappearance, the FBI conducted extensive searches at two of Wang's residences. His profile, along with his wife's, was removed by Indiana University, and they have become unreachable. His wife, Nianli Ma, also employed by the university, has had her information erased. The reasons behind the investigation and the couple's current whereabouts or employment status remain undisclosed. No public charges or court documents are available, and the incident has raised concerns within the academic and research community. | |||||||
Indiana University | Data Leak | 60 | 3 | 02/2020 | IND16422123 | Link | |
Rankiteo Explanation : Attack with significant impact with internal employee data leaksDescription: Indiana University suffered a data security incident after a tool designed to help university staff to access student grade point averages was unintentionally made available to the entire IU community. The tool was however immediately disabled once the ability to access all enrolled studentsโ GPAs was known. Theย GPA calculator tool allowed students, faculty and staff to gain access to records for at least 100,000 current and former students who graduated in 2015 or later. |
Indiana University Company Subsidiaries

Indiana University has nine total campuses: IU Bloomington, IU East, IU Kokomo, IU Northwest, IUPUI, IU Southeast, IU South Bend, IUPUC, and IU Fort Wayne.
Access Data Using Our API

Get company history
.png)
Indiana University Cyber Security News
Top-ranked Cybersecurity and Global Policy Program prepares IU students for in-demand careers
Joe Scavone holds components of a network communication device prototype that he created as part of the Cybersecurity and Global Policyย ...
Cybersecurity professor targeted by FBI has not been detained, lawyer says
A prominent Indiana University cybersecurity professor who was abruptly fired and disappeared from public view has not been detained.
Indiana U. fired cybersecurity professor XiaoFeng Wang on day FBI searched his homes: Union
XiaoFeng Wang's research at Indiana University focused on security and privacy issues in mobile and cloud computing, and privacy issues inย ...
IU faculty want due process for fired cybersecurity expert
More than 250 faculty wrote to Indiana University Provost Rahul Shrivastav, asking that IU reinstate XiaoFeng Wang and follow policy.
Cybersecurity Professor Faced China-Funding Inquiry Before Disappearing, Sources Say
The school is said to have been reviewing for months whether the professor received unreported research funding from China, WIRED has learned.
Lawyers for fired IU cybersecurity professor confirms he is safe, not charged
(WXIN/WTTV) โ Lawyers for XiaoFeng Wang, a former cybersecurity expert at Indiana University at the center of an FBI probe, confirmed thatย ...
FBI searches homes of Indiana University cybersecurity professor
Indiana U. Law Professor Alex Tanford, the union chapter's president, told CNBC in an interview Monday that Wang contacted him earlier thisย ...
IU professor Xiaofeng Wang investigated for academic misconduct before FBI search
IU professor Xiaofeng Wang investigated for academic misconduct before FBI search ยท Mislabeled research, potential Chinese grant controversyย ...
FBI searches homes of Indiana University cybersecurity professor XiaoFeng Wang and wife, seizes boxes
A video grab of an FBI raid at the home of XiaoFeng Wang, associate dean. Source: 13WTHR NBC Affiliate.

Indiana University Similar Companies

University of Wisconsin-Madison
In achievement and prestige, the University of WisconsinโMadison has long been recognized as one of America's great universities. A public, land-grant institution, UWโMadison offers a complete spectrum of liberal arts studies, professional programs and student activities. Spanning 936 acres along th

University of Oxford
Ranked number one in the world in the 2023 Times Higher Education World Rankings, we are at the forefront of the full range of academic disciplines, including medical sciences; mathematical, physical and life sciences; humanities; and social sciences. As the oldest university in the English-speaking

National University of Singapore
At NUS, we are shaping the future through our people and our pursuit of new frontiers in knowledge. In a single century, we have become a university of global influence and an Asian thought leader. Our location at the crossroads of Asia informs our mission and gives us a tremendous vantage point to

University of Florida
University of Florida is a major, public, comprehensive, land-grant, research university. The state's oldest, largest and most comprehensive university, it is among the nation's most academically diverse public universities. University of Florida has a long history of established programs in interna

University of Minnesota
One of the nationโs largest schools, the University of Minnesota offers baccalaureate, masterโs, and doctoral degrees in virtually every fieldโfrom medicine to business, law to liberal arts, and science and engineering to architecture. The University of Minnesota system is made up of five campuses

The University of Georgia
The University of Georgia, a land-grant and sea-grant university with state-wide commitments and responsibilities, is the state's flagship institution of higher education. It is also the state's oldest, most comprehensive and most diversified institution of higher education. Its motto, "to teach, to

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
Indiana University CyberSecurity History Information
How many cyber incidents has Indiana University faced?
Total Incidents: According to Rankiteo, Indiana University has faced 3 incidents in the past.
What types of cybersecurity incidents have occurred at Indiana University?
Incident Types: The types of cybersecurity incidents that have occurred incidents Data Leak and Breach.
How does Indiana University detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through law enforcement notified with Yes and containment measures with The tool was immediately disabled.
Incident Details
Can you provide details on each incident?

Incident : Investigation
Title: Disappearance and Investigation of Xiaofeng Wang
Description: A notable incident involving Xiaofeng Wang, a distinguished computer scientist and tenured professor at Indiana University, has occurred. Following an unexplained disappearance, the FBI conducted extensive searches at two of Wang's residences. His profile, along with his wife's, was removed by Indiana University, and they have become unreachable. His wife, Nianli Ma, also employed by the university, has had her information erased. The reasons behind the investigation and the couple's current whereabouts or employment status remain undisclosed. No public charges or court documents are available, and the incident has raised concerns within the academic and research community.
Type: Investigation
Threat Actor: FBI

Incident : Data Privacy Incident
Title: Data Privacy Incident Involving Research Funding Disclosure
Description: Indiana University faced a data privacy incident involving Professor Xiaofeng Wang, who was accused of not properly disclosing research funding from China. The university questioned Wang about a grant from 2017-2018 that he didn't report correctly, which could affect ongoing research and federal grant applications. There's an implication of research misconduct, which may have an impact on IU's reputation and integrity, especially in the handling of international research collaborations and compliance with federal regulations.
Type: Data Privacy Incident
Vulnerability Exploited: Improper Disclosure of Research Funding
Threat Actor: Professor Xiaofeng Wang
Motivation: Research Misconduct

Incident : Data Breach
Title: Data Security Incident at Indiana University
Description: Indiana University suffered a data security incident after a tool designed to help university staff to access student grade point averages was unintentionally made available to the entire IU community. The tool was immediately disabled once the ability to access all enrolled studentsโ GPAs was known. The GPA calculator tool allowed students, faculty and staff to gain access to records for at least 100,000 current and former students who graduated in 2015 or later.
Type: Data Breach
Attack Vector: Unintentional Data Exposure
Vulnerability Exploited: Improper Access Control
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Breach.
Impact of the Incidents
What was the impact of each incident?

Incident : Data Privacy Incident IND000040425
Brand Reputation Impact: High

Incident : Data Breach IND16422123
Data Compromised: Student Grade Point Averages
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Student Grade Point Averages.
Which entities were affected by each incident?

Incident : Investigation IND000040525
Entity Type: Educational Institution
Industry: Education
Location: Indiana, USA

Incident : Data Privacy Incident IND000040425
Entity Type: Educational Institution
Industry: Education
Location: Indiana, USA

Incident : Data Breach IND16422123
Entity Type: Educational Institution
Industry: Education
Location: Indiana, USA
Response to the Incidents
What measures were taken in response to each incident?

Incident : Investigation IND000040525
Law Enforcement Notified: Yes

Incident : Data Breach IND16422123
Containment Measures: The tool was immediately disabled
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach IND16422123
Type of Data Compromised: Student Grade Point Averages
Number of Records Exposed: At least 100,000
How does the company handle incidents involving personally identifiable information (PII)?
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through was The tool was immediately disabled.
Investigation Status
What is the current status of the investigation for each incident?

Incident : Investigation IND000040525
Investigation Status: Ongoing
Post-Incident Analysis
What were the root causes and corrective actions taken for each incident?

Incident : Data Breach IND16422123
Root Causes: Improper Access Control
Additional Questions
General Information
Who was the attacking group in the last incident?
Last Attacking Group: The attacking group in the last incident were an FBI and Professor Xiaofeng Wang.
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident was Student Grade Point Averages.
Response to the Incidents
What containment measures were taken in the most recent incident?
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was The tool was immediately disabled.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Student Grade Point Averages.
What was the number of records exposed in the most significant breach?
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 100.0K.
Investigation Status
What is the current status of the most recent investigation?
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
