May 24, 2017

DEF CON Talk Cancelled

proxyham-100596165-primary.idge




Each year at DEF CON, we receive a huge number of submissions. While most of them are interesting to some portion of our attendee population, there are normally a few talks that seem to have mass appeal. This year, DEF CON received a submission from Ben Caudill about a technology he had created, called Proxy Ham. The concept was simple; increase the anonymity and privacy of a user by creating a device that allows a remote connection that can’t easily be traced back to the user. The device was designed around a Raspberry Pi, and included wireless interfaces in the…

Cyber Security Degree Students Capture The Flag For Ethical Hackers

Network Security students learning skills in a Capture the Flag challenge




UAT Network Security students who belong to ethical hacking group ‘Layer8′ have began an intense 3-day worldwide challenge of Capture the Flag (CTF), hosted virtually in Milan, Italy. This is not your childhood game of hiding a red bandana from your opponent in the woods. This CTF requires the team to solve security-related challenges in Cryptography, Forensics, Reverse Engineering, Pwning (exploiting weaknesses), Web Hacking and a Grab Bag of miscellaneous tasks. The purpose of this CTF is to help security people look at problems differently and determine the techniques and skills that are needed industry wide. There are also prizes…

5 Things You May Not Know About DEF CON

DEF CON




DEF CON is one of the world’s largest annual hacker conventions, held every year in Las Vegas, since its inception in June 1993. The special sauce to DEF CON is that growth is largely organic and unplanned. As the conference has evolved, DEF CON has adopted the input and great ideas for content and events from many of the attendees and staff. DEF CON attendees can expect to see computer security professionals, journalists, lawyers, federal government employees, security researchers, and hackers interested in computer architecture, phone phreaking, hardware modification, and anything else that can be “cracked.” The event consists of…

Volunteers Needed For Black Hat Briefings This Summer

Black Hat 2015




The Black Hat Briefings are a series of highly technical information security conferences that bring together thought leaders from all facets of the infosec world – from the corporate and government sectors to academic and even underground researchers. Black Hat remains the best and biggest event of its kind, unique in its ability to define tomorrow’s information security landscape. Black Hat is being held at Mandalay Bay in Las Vegas, from Aug. 1-6, 2015. UAT Students can get the experience of a lifetime by applying to volunteer at Black Hat this year. Click this link to submit your application: https://cfp.blackhat.com/volunteers/new This is…

Can We Understand Massive Security Data?

Matrix




Security software and technology are evolving rapidly, allowing security systems to collect and correlate more data about the inner workings of our network and computing systems, than ever before. But nearly no progress has been made in areas relevant to data visualization; which are key to allowing users to comprehend the vast amount of data collected. This puts at risk our ability to understand the key information required to make important decisions related to protecting our data assets. To put this simply, we’re using cutting edge technology to collect security data that we aren’t truly able to fully understand. Without…

DEF CON 23

DEF CON 2015




DEF CON is one of the oldest and largest continuously running hacker conventions around. UAT is making yet another appearance at DEF CON to connect with alumni as well as many like minded technology-driven individuals. Originally started in 1993 by The Dark Tangent, DEF CON is a unique experience for each con-goer. Virtually all events at DEF CON were conceived by the attendees. Some people play capture the flag 24×7, while many people never touch a computer at DEF CON. Some people see every speech they can, while others miss all speeches. Other activities include contests, movie marathons, scavenger hunts, sleep deprivation, lock picking,…

Black Hat 2015

Black Hat 2015




Black Hat is the most technical and relevant global information security event series in the world. For more than 16 years, Black Hat has provided attendees with the very latest in information security research, development, and trends in a strictly vendor-neutral environment. These high-profile global events and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors. From its inception in 1997, Black Hat has grown…

Innovation Isn’t Just A Student Project

Network Security




One of the issues I face when trying to ensure my students are getting the best education in security, is innovation. UAT was founded on the concepts of continued growth, development, and innovation. Within the realm of Network Security, that can be difficult. Students often find themselves relegated to creating new documentation, unless they’re programmers (a much smaller number of the student population). How does a student innovate, or even prove innovation? It can be subjective to the individual reviewing the idea. For example, the students may not be entirely aware of what’s in industry; so how can they be…

Hacking: A Career Or A Lifestyle?

Cyber Security Cave




Your success within information security is ultimately tied to your own dedication to the topic. In other words, if you’re not hacking in your free time, you’re not living up to your potential. In an odd twist, what you do in your free time really DOES impact your success in your work time. Let’s look at it this way. A student attends University in a effort to create a career they will hopefully enjoy, and benefit from. And it’s true, a University degree does offer tremendous value, even in the field of information security. But, in truth, Universities are often…

Be a Cynic




I typically try to be open-minded, and give people the benefit of the doubt. Seriously, I could be wrong, right? I get that. But when it comes to companies that have been hacked, and I’m listening to the story I’m being spoon-fed by their PR department; I’m a cynic. I imagine I always will be, actually. This comes up because of the recent JP Morgan Chase hack, where a purported 76 million households have had their information compromised. The story starts to fall apart each time the company says anything else about the incident, and how widespread the impact is…