May 26, 2017

Cyber Monday Shopping Safety Tips from UAT Cyber Security Professor

Dr Greg Miles Cyber Security at UAT




The holidays are almost here which means the online shopping season is upon us. With the initiative of free shipping being offered by many retailers, online shopping sure is convenient, but is it safe? UAT Cyber Security Professor Dr. Greg Miles shares his tips for safe online shopping this Cyber Monday. 1. Shop at reputable sites – check to make sure you are on a secure site and haven’t been redirected somewhere else before entering your personal information 2. Use a credit card with a low credit limit 3. Don’t use a debit card, it’s more difficult to dispute charges and…

2016 Black Hat Briefings Conference

Black Hat




UAT Cyber Security students will return to Black Hat in a few weeks to serve as paid volunteers assisting with various activities at the conference such as network set up, security, event organization and tear down. Year after year, UAT students are fortunate to have an opportunity because no other technology colleges are granted this privilege. Black Hat is the most technical and relevant global information security event series in the world. For 17 years, Black Hat has provided attendees with the very latest in information security research, development, and trends in a strictly vendor-neutral environment. These high-profile global events and Trainings are…

Jeff Moss “The Dark Tangent,” DEF CON Founder and CSO, to Receive UAT Honorary Doctorate Degree

University of Advancing Technology




UAT Acknowledges Industry Leader in Cyber Security at Annual Commencement Ceremony Each year, University of Advancing Technology (UAT) recognizes leaders in technology who have paved the way for our future graduates to follow in their footsteps. UAT is pleased to announce DEF CON Founder and CSO, Jeff Moss also known as “The Dark Tangent,” as a recipient of an Honorary Doctorate Degree to be awarded at UAT’s Commencement Ceremony on May 6, 2016, at Mesa Arts Center. Moss holds many elite positions in the world of Cyber Security, serving as the Founder of DEF CON and the Black Hat Briefings,…

WRCCDC – UAT Celebrates 2nd Place Win

WRCCDC - UAT Network Security students




Eight Network Security students and Professor Al Kelly loaded up the UAT van on Thursday and set out on a road trip for the Western Regional Collegiate Cyber Defense Competition (WRCCDC) held in Pomona, California, the weekend of March 18-20. The mission of the Collegiate Cyber Defense Competition (CCDC) system is to provide a controlled, competitive environment for institutions with a Computer Science or Information Security curriculum to assess their student’s depth of understanding and operational competency in protecting a corporate network infrastructure. The CCDC competition ask student teams to assume administrative and protective duties for an existing commercial network…

Cyber Security Students Take 3rd Place for Injects – WRCCDC Qualifier

UAT Cyber Security students participating in WRCCDC - Please do not disturb!




Last Saturday was extremely busy at UAT. We hosted the UAT Experience, the Phoenix Global Game Jam, and hidden on the second floor in the UAT Cyber Warfare Range, the WRCCDC Qualifier was in progress, as 14 collegiate teams representing California and Arizona competed for the coveted 8 spots for the West Regional Collegiate Cyber Defense Competition (WRCCDC) in March 2016. Last fall UAT Cyber Security students also participated in the November WRCCDC Invitational, with eight Cyber Security Degree/Network Security Degree students who competed, seven of them participating for the first time. Eight UAT cyber security students, plus a White Team judge spent 6 hours defending a virtual business…

First Cyber Security Degree College in Arizona Marks 15 Years of Elite Graduates

Cyber Security Degree at UAT




Originating and leading cyber security degree education in Arizona, University of Advancing Technology (UAT) is marking 15 successful years since the inception of its elite Network Security degree program. The longest-running cyber security degree program in the state has prepared more graduates from a NSA- and CAE-credentialed education than any other university’s cyber program in Arizona. As a result, they have taken their place among the nation’s top cyber security professionals and help to meet growing demand that recently surpassed 200,000 job openings. Prior to cyber security becoming part of the U.S. vocabulary, UAT launched the Network Security degree, now…

Cyber Security Students Volunteer at Black Hat & DEF CON

Black Hat volunteers




A group of UAT Network Security students and alumni were given the chance to participate in Black Hat USA 2015 as paid volunteers and were also granted free access to DEF CON 23. Black Hat is a security conference designed to attract people of all walks of life such as corporate businesses, government agencies, military, the private sector and independent security experts. This year, Black Hat USA 2015 was held at the Mandalay Bay Resort and Casino in Las Vegas, from Aug. 1-6. Thanks to UAT Net Sec Professor Russ Rogers, UAT was the only university given the chance to…

DEF CON Talk Cancelled

proxyham-100596165-primary.idge




Each year at DEF CON, we receive a huge number of submissions. While most of them are interesting to some portion of our attendee population, there are normally a few talks that seem to have mass appeal. This year, DEF CON received a submission from Ben Caudill about a technology he had created, called Proxy Ham. The concept was simple; increase the anonymity and privacy of a user by creating a device that allows a remote connection that can’t easily be traced back to the user. The device was designed around a Raspberry Pi, and included wireless interfaces in the…

Cyber Security Degree Students Capture The Flag For Ethical Hackers

Network Security students learning skills in a Capture the Flag challenge




UAT Network Security students who belong to ethical hacking group ‘Layer8′ have began an intense 3-day worldwide challenge of Capture the Flag (CTF), hosted virtually in Milan, Italy. This is not your childhood game of hiding a red bandana from your opponent in the woods. This CTF requires the team to solve security-related challenges in Cryptography, Forensics, Reverse Engineering, Pwning (exploiting weaknesses), Web Hacking and a Grab Bag of miscellaneous tasks. The purpose of this CTF is to help security people look at problems differently and determine the techniques and skills that are needed industry wide. There are also prizes…

5 Things You May Not Know About DEF CON

DEF CON




DEF CON is one of the world’s largest annual hacker conventions, held every year in Las Vegas, since its inception in June 1993. The special sauce to DEF CON is that growth is largely organic and unplanned. As the conference has evolved, DEF CON has adopted the input and great ideas for content and events from many of the attendees and staff. DEF CON attendees can expect to see computer security professionals, journalists, lawyers, federal government employees, security researchers, and hackers interested in computer architecture, phone phreaking, hardware modification, and anything else that can be “cracked.” The event consists of…