July 24, 2017

Cyber Security Alumni to Hold 2-Day Training at Black Hat Under New Startup Antimatter Security, LLC

Antimatter Security LLC




Cyber Security alumni have created a startup company for penetration testing called AntiMatter Security, LLC. The team consists of William Peterson (Network Security, Technology Forensics), Stephen Chicosky (Network Security, Network Engineering), Kenny Welch (Network Security), Roger Brambila (Network Security, Advancing Computer Science) and Roger Allen (Network Security, Advancing Computer Science) all who earned their degrees from UAT. These students have been to Black Hat Briefings as paid volunteers in the past. This year, they will return to the conference as trainers teaching two 2-day classes they developed called “Attacks Over GSM With Project Mayhem.” Participants will immerse themselves in the world…

UAT’s Network Security Team Takes A Roadtrip To WRCCDC

UAT WRCCDC Qualifier Cyber Security students




UAT Cyber Security students have been prepping for the Western Regional Collegiate Cyber Defense Competition (WRCCDC) since last fall. They competed in the CCDC Virtual Qualifier in January 2017, finishing in 4th place, which secured them a spot at WRCCDC on March 24-26, 2017, at the Cal Poly Pomona Bronco Center. UAT students take this competition very seriously as there is a selection process for being accepted to UAT’s CCDC team. Keep in mind that UAT took 2nd place at 2016 WRCCDC. This being the 10th year of the NRCCDC, UAT would like to mirror that level of success in…

UAT Network Security Team Qualifies for Western Regional CCDC

UAT CCDC Team Qualifies for Regionals.jpg




UAT Cyber Security students finished in 4th place at the CCDC Virtual Qualifier over the weekend securing them a spot at Western Regional Collegiate Cyber Defense Competition (WRCCDC) on March 24-26, 2017, at the Cal Poly Pomona Bronco Center. UAT students are far from newbs to this competition, as UAT took 2nd place at 2016 WRCCDC. In the zone… UAT’s roster of 11 students including the eight selected participants and three alternates locked themselves in the Cyber Warfare Range an hour prior to competing, in order to brainstorm strategies, review items of interest, and discuss tactics if certain issues arise. It’s…

2016 Black Hat Briefings Conference

Black Hat




UAT Cyber Security students will return to Black Hat in a few weeks to serve as paid volunteers assisting with various activities at the conference such as network set up, security, event organization and tear down. Year after year, UAT students are fortunate to have an opportunity because no other technology colleges are granted this privilege. Black Hat is the most technical and relevant global information security event series in the world. For 17 years, Black Hat has provided attendees with the very latest in information security research, development, and trends in a strictly vendor-neutral environment. These high-profile global events and Trainings are…

UAT Network Security Experts Featured in Ransomware Story

Ransomware interview with Fox10 Phoenix and UAT Provost Dave Bolman




What is ransomware and how should one handle it? In the UAT Cyber Warfare Range, Provost Dr. Dave Bolman and ‎Network Security‬ Professor Al Kelly comment on ‪ransomware‬ and how to handle the threat in a FOX 10 Phoenix interview with special assignment reporters Kristy Siefkin and Tishin Donkersley.  Ransomware – a type of malware that can be covertly installed on a computer without the knowledge of the user which restricts access to the infected computer system and demands that the user pay a ransom to the malware operators to remove the restriction.  The topic of ransomware is frequently discussed in the news…

Jeff Moss “The Dark Tangent,” DEF CON Founder and CSO, to Receive UAT Honorary Doctorate Degree

University of Advancing Technology




UAT Acknowledges Industry Leader in Cyber Security at Annual Commencement Ceremony Each year, University of Advancing Technology (UAT) recognizes leaders in technology who have paved the way for our future graduates to follow in their footsteps. UAT is pleased to announce DEF CON Founder and CSO, Jeff Moss also known as “The Dark Tangent,” as a recipient of an Honorary Doctorate Degree to be awarded at UAT’s Commencement Ceremony on May 6, 2016, at Mesa Arts Center. Moss holds many elite positions in the world of Cyber Security, serving as the Founder of DEF CON and the Black Hat Briefings,…

Cyber Security Students Take 3rd Place for Injects – WRCCDC Qualifier

UAT Cyber Security students participating in WRCCDC - Please do not disturb!




Last Saturday was extremely busy at UAT. We hosted the UAT Experience, the Phoenix Global Game Jam, and hidden on the second floor in the UAT Cyber Warfare Range, the WRCCDC Qualifier was in progress, as 14 collegiate teams representing California and Arizona competed for the coveted 8 spots for the West Regional Collegiate Cyber Defense Competition (WRCCDC) in March 2016. Last fall UAT Cyber Security students also participated in the November WRCCDC Invitational, with eight Cyber Security Degree/Network Security Degree students who competed, seven of them participating for the first time. Eight UAT cyber security students, plus a White Team judge spent 6 hours defending a virtual business…

UAT Cyber Security Degree Students Participate in November WRCCDC Invitational

WRCCDC Invitational




The November Western Regional Collegiate Cyber Defense Competition (WRCCDC) Invitational was held Saturday, November 7, from 10:30 a.m. – 4:30 p.m. UAT had eight Cyber Security Degree/Network Security Degree students complete, seven of them participating for the first time. The WRCCDC Invitational is a virtual competition that UAT Cyber Security Degree students were able to attend right from UAT’s Cyber Cave on campus. Here’s what six hours of determination looks like! It actually looks like these guys had fun, too. Network Security Faculty Advisor Al Kelly said, “They were great at keeping services up, but need to work on Injects and Red Team Attack…

See Through Walls With Wi-Fi Devices

Superman See Through Walls with Wifi Devices




Cutting edge technology now gives Superman some competition. Scientists at MIT’s Computer Science and Artificial Intelligence Lab have developed a device that uses WiFi signals to effectively see through walls and other obstacles, with the ability to identify which persons are standing behind it. This new technology coined RF Capture, is enhanced version of previous methods of capturing movements across a house – technology used by mothers to see their baby’s breathing and firefighters to determine if there are survivors in a burning building. How does RF Capture work?  RF-Capture works by transmitting wireless signals that, upon hitting a person standing behind a wall,…

Cyber Security Students Volunteer at Black Hat & DEF CON

Black Hat volunteers




A group of UAT Network Security students and alumni were given the chance to participate in Black Hat USA 2015 as paid volunteers and were also granted free access to DEF CON 23. Black Hat is a security conference designed to attract people of all walks of life such as corporate businesses, government agencies, military, the private sector and independent security experts. This year, Black Hat USA 2015 was held at the Mandalay Bay Resort and Casino in Las Vegas, from Aug. 1-6. Thanks to UAT Net Sec Professor Russ Rogers, UAT was the only university given the chance to…