October 21, 2017

5 Things You May Not Know About DEF CON

DEF CON

DEF CON is one of the world’s largest annual hacker conventions, held every year in Las Vegas, since its inception in June 1993. The special sauce to DEF CON is that growth is largely organic and unplanned. As the conference has evolved, DEF CON has adopted the input and great ideas for content and events from many of the attendees and staff. DEF CON attendees can expect to see computer security professionals, journalists, lawyers, federal government employees, security researchers, and hackers interested in computer architecture, phone phreaking, hardware modification, and anything else that can be “cracked.” The event consists of…

Recent TV Programing Correlates to UAT Degrees

battlebots

Television has recently shined a light on two exciting majors offered at University of Advancing Technology: Robotics and Embedded Systems and Network Security. You heard me right! Hit the DVR and let’s see what these shows are all about. BattleBots – Sundays at 9 p.m. on ABC The premise: The homemade robots will battle against each other, in a single elimination tournament style format, until there is just one champion. The new series promises to wow viewers with next generation robots—bigger, faster and stronger than ever before. The show will have a greater emphasis on the design and build elements…

Leading Technology University Offers Elite Business Technology Degree For Tomorrow’s Top Business Management Innovators

Business Technology Degree at UAT

FOR IMMEDIATE RELEASE CONTACT: Alan Hromas University of Advancing Technology 602-326-2781 | ahromas@uat.edu Tempe, Ariz. (June 11, 2015) – University of Advancing Technology (UAT) is introducing the Bachelor of Science in Business Technology degree, preparing students to be tech savvy leaders in high-demand technology management careers. In UAT’s Business Technology degree program, students develop the skills to excel in business management, global business, innovation, technology product development and project management. Students become fluent in business models, big data analysis and business development methodology, managing cross-functional and international teams, strategic management, innovation and data-driven marketing. They learn it – and do…

Volunteers Needed For Black Hat Briefings This Summer

Black Hat 2015

The Black Hat Briefings are a series of highly technical information security conferences that bring together thought leaders from all facets of the infosec world – from the corporate and government sectors to academic and even underground researchers. Black Hat remains the best and biggest event of its kind, unique in its ability to define tomorrow’s information security landscape. Black Hat is being held at Mandalay Bay in Las Vegas, from Aug. 1-6, 2015. UAT Students can get the experience of a lifetime by applying to volunteer at Black Hat this year. Click this link to submit your application: https://cfp.blackhat.com/volunteers/new This is…

What Would Be Great To Do Next…

Technology

A couple weeks ago I spoke to the UAT graduating class and in that message I referred to the implications of living in and building upon the current world landscape. Specifically I pointed to the accomplishment of creating a universal access to the Internet and computing resources that is now deeply woven into our daily lives. This was the great and admirable work of the previous generation. And while there is still plenty (lifetimes) of work left to be done in this area, we have breathing room to ask the question – What is next? When I think about what…

UAT Professor Vita-More, Panelist At BRINK2015.1

Speakers at the Brink - Natasha Vita-Moore

UAT is proud of faculty member Natasha Vita-More, Professor of Human Enhancement Technology, Emerging Technology, Multi-Media and Design and Bio Science, who spoke on two panels at the BRINK2015.1 Conference last weekend in Palm Desert, Cali. BRINK2015.1 is a unique gathering of technologists, futurists, engineers, space entrepreneurs and social philosophers, all brought together to discuss the path we find ourselves on, to thoughtfully consider how and where we want to go in the future. Professor Vita-More (top center in the photo) spoke on the following topics: “Designing New Humanity: A is for Augmentation, or is it Avatar?” and “What I Know…

DEF CON 23

DEF CON 2015

DEF CON is one of the oldest and largest continuously running hacker conventions around. UAT is making yet another appearance at DEF CON to connect with alumni as well as many like minded technology-driven individuals. Originally started in 1993 by The Dark Tangent, DEF CON is a unique experience for each con-goer. Virtually all events at DEF CON were conceived by the attendees. Some people play capture the flag 24×7, while many people never touch a computer at DEF CON. Some people see every speech they can, while others miss all speeches. Other activities include contests, movie marathons, scavenger hunts, sleep deprivation, lock picking,…

Innovation Isn’t Just A Student Project

Network Security

One of the issues I face when trying to ensure my students are getting the best education in security, is innovation. UAT was founded on the concepts of continued growth, development, and innovation. Within the realm of Network Security, that can be difficult. Students often find themselves relegated to creating new documentation, unless they’re programmers (a much smaller number of the student population). How does a student innovate, or even prove innovation? It can be subjective to the individual reviewing the idea. For example, the students may not be entirely aware of what’s in industry; so how can they be…

Be a Cynic

I typically try to be open-minded, and give people the benefit of the doubt. Seriously, I could be wrong, right? I get that. But when it comes to companies that have been hacked, and I’m listening to the story I’m being spoon-fed by their PR department; I’m a cynic. I imagine I always will be, actually. This comes up because of the recent JP Morgan Chase hack, where a purported 76 million households have had their information compromised. The story starts to fall apart each time the company says anything else about the incident, and how widespread the impact is…

New Methods of Attack?

Back in the late 90’s, we saw methodologies of exploitation that relied heavily upon poor programming practices within core services on computers. One example of that is the FTP PASV vulnerability, which allowed a hacker to dump the password hashes for all users contained in the /etc/shadow file, simply by following a series of steps, and causing a segmentation fault. The resulting “core” file would contain a full memory dump of the system, including the shadow file, if it had recently been pulled into memory. As time progressed, hackers became obsessed with other methods of attack, such as buffer and heap…