August 19, 2017

V.A.S.T.

VAST-SIP

Data breaches, identity theft, phishing schemes and large scale hacks happen all day, every day. When solving cyber crimes, it’s challenging for a first responder to capture critical information from a computer at a crime scene in the heat of an investigation without the in-depth training that UAT Network Security students received. To solve this problem, Network Security alumni Will Peterson struck up a conversation with Professor Frank Griffiths, who teaches forensics at UAT and formerly worked for the Scottsdale District Attorney. Will and a four other Network Security put their heads together for their Student Innovation Project and created…



Cyber Security Alumni to Hold 2-Day Training at Black Hat Under New Startup Antimatter Security, LLC

Antimatter Security LLC

Cyber Security alumni have created a startup company for penetration testing called AntiMatter Security, LLC. The team consists of William Peterson (Network Security, Technology Forensics), Stephen Chicosky (Network Security, Network Engineering), Kenny Welch (Network Security), Roger Brambila (Network Security, Advancing Computer Science) and Roger Allen (Network Security, Advancing Computer Science) all who earned their degrees from UAT. These students have been to Black Hat Briefings as paid volunteers in the past. This year, they will return to the conference as trainers teaching two 2-day classes they developed called “Attacks Over GSM With Project Mayhem.” Participants will immerse themselves in the world…



UAT’s Network Security Team Takes A Roadtrip To WRCCDC

UAT WRCCDC Qualifier Cyber Security students

UAT Cyber Security students have been prepping for the Western Regional Collegiate Cyber Defense Competition (WRCCDC) since last fall. They competed in the CCDC Virtual Qualifier in January 2017, finishing in 4th place, which secured them a spot at WRCCDC on March 24-26, 2017, at the Cal Poly Pomona Bronco Center. UAT students take this competition very seriously as there is a selection process for being accepted to UAT’s CCDC team. Keep in mind that UAT took 2nd place at 2016 WRCCDC. This being the 10th year of the NRCCDC, UAT would like to mirror that level of success in…



UAT Network Security Team Qualifies for Western Regional CCDC

UAT CCDC Team Qualifies for Regionals.jpg

UAT Cyber Security students finished in 4th place at the CCDC Virtual Qualifier over the weekend securing them a spot at Western Regional Collegiate Cyber Defense Competition (WRCCDC) on March 24-26, 2017, at the Cal Poly Pomona Bronco Center. UAT students are far from newbs to this competition, as UAT took 2nd place at 2016 WRCCDC. In the zone… UAT’s roster of 11 students including the eight selected participants and three alternates locked themselves in the Cyber Warfare Range an hour prior to competing, in order to brainstorm strategies, review items of interest, and discuss tactics if certain issues arise. It’s…



2016 Black Hat Briefings Conference

Black Hat

UAT Cyber Security students will return to Black Hat in a few weeks to serve as paid volunteers assisting with various activities at the conference such as network set up, security, event organization and tear down. Year after year, UAT students are fortunate to have an opportunity because no other technology colleges are granted this privilege. Black Hat is the most technical and relevant global information security event series in the world. For 17 years, Black Hat has provided attendees with the very latest in information security research, development, and trends in a strictly vendor-neutral environment. These high-profile global events and Trainings are…



UAT Network Security Experts Featured in Ransomware Story

Ransomware interview with Fox10 Phoenix and UAT Provost Dave Bolman

What is ransomware and how should one handle it? In the UAT Cyber Warfare Range, Provost Dr. Dave Bolman and ‎Network Security‬ Professor Al Kelly comment on ‪ransomware‬ and how to handle the threat in a FOX 10 Phoenix interview with special assignment reporters Kristy Siefkin and Tishin Donkersley.  Ransomware – a type of malware that can be covertly installed on a computer without the knowledge of the user which restricts access to the infected computer system and demands that the user pay a ransom to the malware operators to remove the restriction.  The topic of ransomware is frequently discussed in the news…



Jeff Moss “The Dark Tangent,” DEF CON Founder and CSO, to Receive UAT Honorary Doctorate Degree

University of Advancing Technology

UAT Acknowledges Industry Leader in Cyber Security at Annual Commencement Ceremony Each year, University of Advancing Technology (UAT) recognizes leaders in technology who have paved the way for our future graduates to follow in their footsteps. UAT is pleased to announce DEF CON Founder and CSO, Jeff Moss also known as “The Dark Tangent,” as a recipient of an Honorary Doctorate Degree to be awarded at UAT’s Commencement Ceremony on May 6, 2016, at Mesa Arts Center. Moss holds many elite positions in the world of Cyber Security, serving as the Founder of DEF CON and the Black Hat Briefings,…



Cyber Security Students Take 3rd Place for Injects – WRCCDC Qualifier

UAT Cyber Security students participating in WRCCDC - Please do not disturb!

Last Saturday was extremely busy at UAT. We hosted the UAT Experience, the Phoenix Global Game Jam, and hidden on the second floor in the UAT Cyber Warfare Range, the WRCCDC Qualifier was in progress, as 14 collegiate teams representing California and Arizona competed for the coveted 8 spots for the West Regional Collegiate Cyber Defense Competition (WRCCDC) in March 2016. Last fall UAT Cyber Security students also participated in the November WRCCDC Invitational, with eight Cyber Security Degree/Network Security Degree students who competed, seven of them participating for the first time. Eight UAT cyber security students, plus a White Team judge spent 6 hours defending a virtual business…



UAT Cyber Security Degree Students Participate in November WRCCDC Invitational

WRCCDC Invitational

The November Western Regional Collegiate Cyber Defense Competition (WRCCDC) Invitational was held Saturday, November 7, from 10:30 a.m. – 4:30 p.m. UAT had eight Cyber Security Degree/Network Security Degree students complete, seven of them participating for the first time. The WRCCDC Invitational is a virtual competition that UAT Cyber Security Degree students were able to attend right from UAT’s Cyber Cave on campus. Here’s what six hours of determination looks like! It actually looks like these guys had fun, too. Network Security Faculty Advisor Al Kelly said, “They were great at keeping services up, but need to work on Injects and Red Team Attack…



See Through Walls With Wi-Fi Devices

Superman See Through Walls with Wifi Devices

Cutting edge technology now gives Superman some competition. Scientists at MIT’s Computer Science and Artificial Intelligence Lab have developed a device that uses WiFi signals to effectively see through walls and other obstacles, with the ability to identify which persons are standing behind it. This new technology coined RF Capture, is enhanced version of previous methods of capturing movements across a house – technology used by mothers to see their baby’s breathing and firefighters to determine if there are survivors in a burning building. How does RF Capture work?  RF-Capture works by transmitting wireless signals that, upon hitting a person standing behind a wall,…