July 28, 2017

UAT Network Security Experts Featured in Ransomware Story

Ransomware interview with Fox10 Phoenix and UAT Provost Dave Bolman




What is ransomware and how should one handle it? In the UAT Cyber Warfare Range, Provost Dr. Dave Bolman and ‎Network Security‬ Professor Al Kelly comment on ‪ransomware‬ and how to handle the threat in a FOX 10 Phoenix interview with special assignment reporters Kristy Siefkin and Tishin Donkersley.  Ransomware – a type of malware that can be covertly installed on a computer without the knowledge of the user which restricts access to the infected computer system and demands that the user pay a ransom to the malware operators to remove the restriction.  The topic of ransomware is frequently discussed in the news…

Jeff Moss “The Dark Tangent,” DEF CON Founder and CSO, to Receive UAT Honorary Doctorate Degree

University of Advancing Technology




UAT Acknowledges Industry Leader in Cyber Security at Annual Commencement Ceremony Each year, University of Advancing Technology (UAT) recognizes leaders in technology who have paved the way for our future graduates to follow in their footsteps. UAT is pleased to announce DEF CON Founder and CSO, Jeff Moss also known as “The Dark Tangent,” as a recipient of an Honorary Doctorate Degree to be awarded at UAT’s Commencement Ceremony on May 6, 2016, at Mesa Arts Center. Moss holds many elite positions in the world of Cyber Security, serving as the Founder of DEF CON and the Black Hat Briefings,…

Avnet Tech Games – 2016 Winners

Avnet Tech Games 2016




On Saturday, April 2, UAT Campus was packed with student innovators prepared to compete in tech games ranging in Network Security, Marketing and Social Media, Robotics and more. Winners were rewarded with scholarships and awesome tech swag, as well as bragging rights against local competitive colleges. Almost 200 students from 16 local colleges showed up making 2016 a year of stiff competition! The 11th Annual Avnet Tech Games included the following STEM challenges: CISCO Network Expert Security Battle, Desktop Domination, HP Fastest IoT Computer Build, IoT Sensor Fusion Challenge, WWT/Palo Alto Server Search, Java Blitz, Robot Race Obstacle Course, Social Media Mania, and Solar Scrimmage. If you…

WRCCDC – UAT Celebrates 2nd Place Win

WRCCDC - UAT Network Security students




Eight Network Security students and Professor Al Kelly loaded up the UAT van on Thursday and set out on a road trip for the Western Regional Collegiate Cyber Defense Competition (WRCCDC) held in Pomona, California, the weekend of March 18-20. The mission of the Collegiate Cyber Defense Competition (CCDC) system is to provide a controlled, competitive environment for institutions with a Computer Science or Information Security curriculum to assess their student’s depth of understanding and operational competency in protecting a corporate network infrastructure. The CCDC competition ask student teams to assume administrative and protective duties for an existing commercial network…

Cyber Security Students Take 3rd Place for Injects – WRCCDC Qualifier

UAT Cyber Security students participating in WRCCDC - Please do not disturb!




Last Saturday was extremely busy at UAT. We hosted the UAT Experience, the Phoenix Global Game Jam, and hidden on the second floor in the UAT Cyber Warfare Range, the WRCCDC Qualifier was in progress, as 14 collegiate teams representing California and Arizona competed for the coveted 8 spots for the West Regional Collegiate Cyber Defense Competition (WRCCDC) in March 2016. Last fall UAT Cyber Security students also participated in the November WRCCDC Invitational, with eight Cyber Security Degree/Network Security Degree students who competed, seven of them participating for the first time. Eight UAT cyber security students, plus a White Team judge spent 6 hours defending a virtual business…

UAT Cyber Security Degree Students Participate in November WRCCDC Invitational

WRCCDC Invitational




The November Western Regional Collegiate Cyber Defense Competition (WRCCDC) Invitational was held Saturday, November 7, from 10:30 a.m. – 4:30 p.m. UAT had eight Cyber Security Degree/Network Security Degree students complete, seven of them participating for the first time. The WRCCDC Invitational is a virtual competition that UAT Cyber Security Degree students were able to attend right from UAT’s Cyber Cave on campus. Here’s what six hours of determination looks like! It actually looks like these guys had fun, too. Network Security Faculty Advisor Al Kelly said, “They were great at keeping services up, but need to work on Injects and Red Team Attack…

See Through Walls With Wi-Fi Devices

Superman See Through Walls with Wifi Devices




Cutting edge technology now gives Superman some competition. Scientists at MIT’s Computer Science and Artificial Intelligence Lab have developed a device that uses WiFi signals to effectively see through walls and other obstacles, with the ability to identify which persons are standing behind it. This new technology coined RF Capture, is enhanced version of previous methods of capturing movements across a house – technology used by mothers to see their baby’s breathing and firefighters to determine if there are survivors in a burning building. How does RF Capture work?  RF-Capture works by transmitting wireless signals that, upon hitting a person standing behind a wall,…

Cyber Security Students Volunteer at Black Hat & DEF CON

Black Hat volunteers




A group of UAT Network Security students and alumni were given the chance to participate in Black Hat USA 2015 as paid volunteers and were also granted free access to DEF CON 23. Black Hat is a security conference designed to attract people of all walks of life such as corporate businesses, government agencies, military, the private sector and independent security experts. This year, Black Hat USA 2015 was held at the Mandalay Bay Resort and Casino in Las Vegas, from Aug. 1-6. Thanks to UAT Net Sec Professor Russ Rogers, UAT was the only university given the chance to…

Cyber Security Degree Students Capture The Flag For Ethical Hackers

Network Security students learning skills in a Capture the Flag challenge




UAT Network Security students who belong to ethical hacking group ‘Layer8’ have began an intense 3-day worldwide challenge of Capture the Flag (CTF), hosted virtually in Milan, Italy. This is not your childhood game of hiding a red bandana from your opponent in the woods. This CTF requires the team to solve security-related challenges in Cryptography, Forensics, Reverse Engineering, Pwning (exploiting weaknesses), Web Hacking and a Grab Bag of miscellaneous tasks. The purpose of this CTF is to help security people look at problems differently and determine the techniques and skills that are needed industry wide. There are also prizes…

5 Things You May Not Know About DEF CON

DEF CON




DEF CON is one of the world’s largest annual hacker conventions, held every year in Las Vegas, since its inception in June 1993. The special sauce to DEF CON is that growth is largely organic and unplanned. As the conference has evolved, DEF CON has adopted the input and great ideas for content and events from many of the attendees and staff. DEF CON attendees can expect to see computer security professionals, journalists, lawyers, federal government employees, security researchers, and hackers interested in computer architecture, phone phreaking, hardware modification, and anything else that can be “cracked.” The event consists of…