July 27, 2017

Recent TV Programing Correlates to UAT Degrees

battlebots




Television has recently shined a light on two exciting majors offered at University of Advancing Technology: Robotics and Embedded Systems and Network Security. You heard me right! Hit the DVR and let’s see what these shows are all about. BattleBots – Sundays at 9 p.m. on ABC The premise: The homemade robots will battle against each other, in a single elimination tournament style format, until there is just one champion. The new series promises to wow viewers with next generation robots—bigger, faster and stronger than ever before. The show will have a greater emphasis on the design and build elements…

Volunteers Needed For Black Hat Briefings This Summer

Black Hat 2015




The Black Hat Briefings are a series of highly technical information security conferences that bring together thought leaders from all facets of the infosec world – from the corporate and government sectors to academic and even underground researchers. Black Hat remains the best and biggest event of its kind, unique in its ability to define tomorrow’s information security landscape. Black Hat is being held at Mandalay Bay in Las Vegas, from Aug. 1-6, 2015. UAT Students can get the experience of a lifetime by applying to volunteer at Black Hat this year. Click this link to submit your application: https://cfp.blackhat.com/volunteers/new This is…

Can We Understand Massive Security Data?




Security software and technology are evolving rapidly, allowing security systems to collect and correlate more data about the inner workings of our network and computing systems, than ever before. But nearly no progress has been made in areas relevant to data visualization; which are key to allowing users to comprehend the vast amount of data collected. This puts at risk our ability to understand the key information required to make important decisions related to protecting our data assets. To put this simply, we’re using cutting edge technology to collect security data that we aren’t truly able to fully understand. Without…

Hacking: A Career Or A Lifestyle?

Cyber Security Cave




Your success within information security is ultimately tied to your own dedication to the topic. In other words, if you’re not hacking in your free time, you’re not living up to your potential. In an odd twist, what you do in your free time really DOES impact your success in your work time. Let’s look at it this way. A student attends University in a effort to create a career they will hopefully enjoy, and benefit from. And it’s true, a University degree does offer tremendous value, even in the field of information security. But, in truth, Universities are often…

Be a Cynic




I typically try to be open-minded, and give people the benefit of the doubt. Seriously, I could be wrong, right? I get that. But when it comes to companies that have been hacked, and I’m listening to the story I’m being spoon-fed by their PR department; I’m a cynic. I imagine I always will be, actually. This comes up because of the recent JP Morgan Chase hack, where a purported 76 million households have had their information compromised. The story starts to fall apart each time the company says anything else about the incident, and how widespread the impact is…

New Methods of Attack?




Back in the late 90’s, we saw methodologies of exploitation that relied heavily upon poor programming practices within core services on computers. One example of that is the FTP PASV vulnerability, which allowed a hacker to dump the password hashes for all users contained in the /etc/shadow file, simply by following a series of steps, and causing a segmentation fault. The resulting “core” file would contain a full memory dump of the system, including the shadow file, if it had recently been pulled into memory. As time progressed, hackers became obsessed with other methods of attack, such as buffer and heap…

Norman: An ‘Antivirus on a Cable’

Norman AntiVirus




Sometimes you wanna go.. Where everybody knows your name and they’re always glad you came. You wanna be where you can see, the troubles are all the same. you wanna be where everybody knows your name! Norm! For the low cost of $50 K – Norm will be your friend! Norm – A standalone in-band scanning terminal for incoming and outgoing data to the downstream industrial control system. Norm fills the anti-virus SCADA gap that were not apart of the original optimistic industrial control system designs. Read more about my friend Norm.   Link to this post!Related PostsFirst Cyber Security…