January 30, 2024

This article has been reviewed according to Science X's editorial process and policies. Editors have highlighted the following attributes while ensuring the content's credibility:

fact-checked
trusted source
proofread

Expert explains the alarming creativity of today's cyberattacks, and five unlikely places you're vulnerable

The increased sophistication of cyberattacks through social media platforms, computer hardware, smart devices and popular websites demands more care in how we engage the internet, says Associate Research Professor Charlie Harry. "At the end of the day, we should all expect the worst and have an action plan for recovery." Credit: Valerie Morgan/University of Maryland
× close
The increased sophistication of cyberattacks through social media platforms, computer hardware, smart devices and popular websites demands more care in how we engage the internet, says Associate Research Professor Charlie Harry. "At the end of the day, we should all expect the worst and have an action plan for recovery." Credit: Valerie Morgan/University of Maryland

Associate Research Professor Charles Harry likes to strike up conversations with his new students by asking about their pets: Their favorite memories, the name of their first pet, even if they chose the collar based on their favorite color. Most don't hesitate—after all, he's their professor.

But what if the question comes by email or social media post—and despite all appearances it's not really Harry asking? What many students don't realize is that they've just surrendered two potential password challenge questions.

Being mindful about the information you share, from your birthplace in a social post to professional qualifications on LinkedIn, is critical as cyberattacks become more nuanced, said Harry; and we should all expect the worst. A former National Security Agency cyberwarfare expert and director of the University of Maryland's Center for Governance of Technology and Systems, Harry has made it his mission to educate not just students, but CEOs, government leaders and other novices in understanding and identifying their risk to a .

Harry's "Cybersecurity for Everyone" is the most popular UMD massive open online course (MOOC) on the continuing education website Coursera, with more than 500 enrollments per day globally. Harry's most recent endeavor with colleagues and students from the College of Information Studies and School of Public Policy developed "attack surface maps" for state government leaders: tools that for the first time reveal county government vulnerabilities in every municipality nationwide, arming them with the intel to preempt cyberattacks, rather than just react to them.

"My goal is to get people seeing cybersecurity in a very interconnected way," he said. "All this stuff—laptops, phones, cloud systems—is widely dispersed geographically but it all works together. And so, you have to understand the big-picture view of this problem, and how a vulnerability in just one device can cascade into something widespread."

Cyberattacks have gotten much more sophisticated and complex over the past 15 years, he said, with "black hat" hackers specializing in writing malware or gaining access working together across criminal enterprises. According to Harry, cyberthreats shouldn't just be keeping Gov. Wes Moore or a Fortune 500 executive up at night—anyone who connects to a commercial, government or institutional website is a point of entry to a potential payout.

"You may not have access to the most sensitive information, but what you do have is access to the network," he said. "You're a conduit to what they want to get."

Faculty and staff are required to sit through UMD's security awareness training, "Defend Your Shell," by the March 1 deadline—but your inbox isn't the only place where potential threats lurk, said Harry. Below, he shares a few unlikely places vulnerable to a cyberattack:

Load comments (0)