Security News > 2011 > April > Experts dissect hacker attacks during cybersecurity forum at Hagerstown Community College

http://www.herald-mail.com/news/local/hm-cyber-experts-dissect-hacker-attacks-during-cybersecurity-forum-at-hagerstown-community-college-20110427,0,2996601.story By ANDREW SCHOTZ herald-mail.com April 27, 2011 Experts Wednesday detailed simple and complex ways to protect computers during a cybersecurity forum held at Hagerstown Community College. One basic defense against computer hackers is making passwords difficult to guess. Don't go for obvious words or names, and insert symbols and spaces, they urged. Experts from Chickasaw Nation Industries also showed how a system of electronic commerce known as "cloud computing" could be exploited. It was the second time this year that U.S. Rep. Roscoe G. Bartlett, R-Md., has hosted a cybersecurity forum. The first was in January at Fort Detrick in Frederick, Md. CNI representatives led hacking demonstrations during Wednesday's forum at HCC's Athletic, Recreation and Community Center. First, Chris Hurley played the role of a hacker who accessed someone else's computer through a Twitter page at a coffee shop with a Wi-Fi connection to the Internet, his every move shown on a projection screen. [...] ___________________________________________________________ Tegatai Managed Colocation: Four Provider Blended Tier-1 Bandwidth, Fortinet Universal Threat Management, Natural Disaster Avoidance, Always-On Power Delivery Network, Cisco Switches, SAS 70 Type II Datacenter. Find peace of mind, Defend your Critical Infrastructure. http://www.tegataiphoenix.com/
News URL
Related news
- whoAMI attacks give hackers code execution on Amazon EC2 instances (source)
- Microsoft: Hackers steal emails in device code phishing attacks (source)
- Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks (source)
- Bybit Hack Traced to Safe{Wallet} Supply Chain Attack Exploited by North Korean Hackers (source)
- Hackers Exploit Paragon Partition Manager Driver Vulnerability in Ransomware Attacks (source)
- Hackers Exploit AWS Misconfigurations to Launch Phishing Attacks via SES and WorkMail (source)
- New ‘Rules File Backdoor’ Attack Lets Hackers Inject Malicious Code via AI Code Editors (source)
- TechRepublic EXCLUSIVE: New Ransomware Attacks are Getting More Personal as Hackers ‘Apply Psychological Pressure” (source)
- Hackers Repurpose RansomHub's EDRKillShifter in Medusa, BianLian, and Play Attacks (source)
- Chinese FamousSparrow hackers deploy upgraded malware in attacks (source)