July 22, 2017

Cyber Security Alumni to Hold 2-Day Training at Black Hat Under New Startup Antimatter Security, LLC

Antimatter Security LLC




Cyber Security alumni have created a startup company for penetration testing called AntiMatter Security, LLC. The team consists of William Peterson (Network Security, Technology Forensics), Stephen Chicosky (Network Security, Network Engineering), Kenny Welch (Network Security), Roger Brambila (Network Security, Advancing Computer Science) and Roger Allen (Network Security, Advancing Computer Science) all who earned their degrees from UAT. These students have been to Black Hat Briefings as paid volunteers in the past. This year, they will return to the conference as trainers teaching two 2-day classes they developed called “Attacks Over GSM With Project Mayhem.” Participants will immerse themselves in the world…

See UAT’s Booth at DEF CON 25

DEF CON 25




Once the Black Hat Briefings come to an end, some UAT student volunteers will report as workers at DEF CON! Because both security conferences fall on the same week, in the same city, many people attend both Black Hat and DEF CON. UAT has a large presence at DEF CON with a huge booth located at Caesar’s Palace where attendees can learn more about cyber security, our bachelor and master’s degrees and check out some cool, nerd swag. DEF CON is more edgy than Black Hat, as it was created in 1993 by a core hacker group who wanted to…

Congrats to UAT’s Cyber Security Teams

UAT's Cyber Security Team for WRCCDC




It’s been a busy couple of weeks for UAT’s Cyber Security students. A team of students competed at 2017 Western Regional Collegiate Cyber Defense Competition (WRCCDC) at Cal Poly Pomona, taking 4th place over schools like UC Berkeley, UC Riverside and ASU the weekend of March 24-26. Cyber Security Professor Wayne Kibbe escorted the team as their faculty coach, chaperoning the roadtrip for the competition. Professor Kibbe said, “Our team had an amazing amount of talent. These students take our security courses but in addition hold workshops most weekends to practice and hone their skills. I’m very proud of their…

2017 Cisco IOT Network Challenge




This weekend at UAT, teams of technology students will compete in a simulation that tests real world networking, security, and consulting skills to deploy an IoT solution for a simulated customer. Each team will act as an IT consulting firm that has been hired by a business to implement a new IoT solution at some of their remote sites. Responsibilities will include the design and implementation of a secure network at the remote site to support the connectivity of an “Internet of Things” endpoint (in this case a Raspberry Pi 3 configured as sensor with an embedded web server) that…

UAT’s Network Security Team Takes A Roadtrip To WRCCDC

UAT WRCCDC Qualifier Cyber Security students




UAT Cyber Security students have been prepping for the Western Regional Collegiate Cyber Defense Competition (WRCCDC) since last fall. They competed in the CCDC Virtual Qualifier in January 2017, finishing in 4th place, which secured them a spot at WRCCDC on March 24-26, 2017, at the Cal Poly Pomona Bronco Center. UAT students take this competition very seriously as there is a selection process for being accepted to UAT’s CCDC team. Keep in mind that UAT took 2nd place at 2016 WRCCDC. This being the 10th year of the NRCCDC, UAT would like to mirror that level of success in…

UAT Network Security Team Qualifies for Western Regional CCDC

UAT CCDC Team Qualifies for Regionals.jpg




UAT Cyber Security students finished in 4th place at the CCDC Virtual Qualifier over the weekend securing them a spot at Western Regional Collegiate Cyber Defense Competition (WRCCDC) on March 24-26, 2017, at the Cal Poly Pomona Bronco Center. UAT students are far from newbs to this competition, as UAT took 2nd place at 2016 WRCCDC. In the zone… UAT’s roster of 11 students including the eight selected participants and three alternates locked themselves in the Cyber Warfare Range an hour prior to competing, in order to brainstorm strategies, review items of interest, and discuss tactics if certain issues arise. It’s…

2016 Black Hat Briefings Conference

Black Hat




UAT Cyber Security students will return to Black Hat in a few weeks to serve as paid volunteers assisting with various activities at the conference such as network set up, security, event organization and tear down. Year after year, UAT students are fortunate to have an opportunity because no other technology colleges are granted this privilege. Black Hat is the most technical and relevant global information security event series in the world. For 17 years, Black Hat has provided attendees with the very latest in information security research, development, and trends in a strictly vendor-neutral environment. These high-profile global events and Trainings are…

WRCCDC – UAT Celebrates 2nd Place Win

WRCCDC - UAT Network Security students




Eight Network Security students and Professor Al Kelly loaded up the UAT van on Thursday and set out on a road trip for the Western Regional Collegiate Cyber Defense Competition (WRCCDC) held in Pomona, California, the weekend of March 18-20. The mission of the Collegiate Cyber Defense Competition (CCDC) system is to provide a controlled, competitive environment for institutions with a Computer Science or Information Security curriculum to assess their student’s depth of understanding and operational competency in protecting a corporate network infrastructure. The CCDC competition ask student teams to assume administrative and protective duties for an existing commercial network…

UAT Cyber Security Degree Students Participate in November WRCCDC Invitational

WRCCDC Invitational




The November Western Regional Collegiate Cyber Defense Competition (WRCCDC) Invitational was held Saturday, November 7, from 10:30 a.m. – 4:30 p.m. UAT had eight Cyber Security Degree/Network Security Degree students complete, seven of them participating for the first time. The WRCCDC Invitational is a virtual competition that UAT Cyber Security Degree students were able to attend right from UAT’s Cyber Cave on campus. Here’s what six hours of determination looks like! It actually looks like these guys had fun, too. Network Security Faculty Advisor Al Kelly said, “They were great at keeping services up, but need to work on Injects and Red Team Attack…

See Through Walls With Wi-Fi Devices

Superman See Through Walls with Wifi Devices




Cutting edge technology now gives Superman some competition. Scientists at MIT’s Computer Science and Artificial Intelligence Lab have developed a device that uses WiFi signals to effectively see through walls and other obstacles, with the ability to identify which persons are standing behind it. This new technology coined RF Capture, is enhanced version of previous methods of capturing movements across a house – technology used by mothers to see their baby’s breathing and firefighters to determine if there are survivors in a burning building. How does RF Capture work?  RF-Capture works by transmitting wireless signals that, upon hitting a person standing behind a wall,…