Category Archives: cybersecurity

Cats Being Used in the IT Field

In this year’s Def Con convention this year showcase had a different twist on IT work. One that merged animals and IT working together. It sounds like a crazy combination and a highly unlikely one that would work well but it did. Gene Bransfield used his friend’s cat, he put on the cat’s color a kit that had Spark Core Wi-Fi development board and had Internet connectivity where ever the cat ended up going.

Now this may sound stupid because cats are going to wander around and do whatever they want to do. But the purpose of the experiment was to see how many people had unsecured, or weak Wi-Fi in their homes. In simple terms who could easily access their Internet just from being on their street.

When the cat was sent out, there was 23 Wi-Fi hotspots found and what they found was more interesting. Four of the networks had been completely open with no security what so ever and four using WEP rather than the WPA-2 standard. The purpose of this was to show that people need to be more aware of the fact that when it comes to Internet you have to have the right safety and protective measures when using the Internet. You never know when a cat or dog with a pack on them will be lurking around to see if you have secure Internet.

Practice Interviews for Computer-related majors with Federated Investors

Federated Investors will be on campus Monday, April 3 to conduct practice interviews specifically for Computer-related Undergraduate students. These majors include:

BS (Bachelor of Science) or BS in Information Sciences
Computer Information Systems
Cyber Forensics Info Security (Fully Online)
Cyber Forensics and Information Security
Data Analytics

Students should treat these mock interviews as real interviews, dressing professionally and researching the company. The practice interview times will be on a first-come, first-serve basis. They will be conducted in the Career and Professional Development Center (aka Career Center), which is located in Benjamin Rush, the building near the back entrance of campus.

To sign up for these interviews:

  1. Go to the ON-CAMPUS INTERVIEW tab on the top toolbar of ColonialTRAK and select ‘Sign up for Interviews or Resume Drops
  2. Select Schedule 770 / PRACTICE INTERVIEW – IS/IT/COMPUTER-related Undergraduate MAJORS ONLY- Federated Investors Company Name: Mock.
  3. Click on the ‘Sign Up‘ button centered near the top of the page.  The list of available interview times will appear.  Select the time desired for the practice interview.

Students should only sign up if they are committed to attend the practice interview. For more information, go to the ColonialTRAK website. If anyone has questions, please contact Carole Weldon at weldon@rmu.edu.

Internship Opportunity – Spanish fluency National Cyber-Forensics & Training Alliance (NCFTA)

The National Cyber-Forensics & Training Alliance (NCFTA) are looking for a candidate who is fluent in the Spanish language. As an intern, you will work with a senior analyst on specific research and data collection using various tools and applications as well as proactive research in open sources. You will also engage in collaboration with NCFTA partners and peers and be expected to participate in program meetings.

Required Qualifications 
• Must be legally authorized to work in the United States and be eligible for a U.S. Government security clearance
• Major studies in areas of consideration: International Affairs/Politics/Relations; Intelligence/Security Studies; Computer Science; Information Security; Business Intelligence or related fields. Other majors are considered on a case by case basis.
• SPANISH FLUENCY REQUIRED – Excellent Verbal and Writing Communication Skills in the Spanish Language
• Minimum GPA of 3.0

To apply for this internship, please click on the link below.

https://www.myinterfase.com/rmu/Job/Detail/b2wvYUd1dDNiaGRZbjlZcG1TWGt5ZjlaUjZGc2lHYWY3NVB4Y21OQWdQST01

New Products Inviting Hackers to Get More of Your Information

In the beginning of February, the Top Secret Colonial officers hacked into a Furby Connect. Furby Connect is a children’s toy that is now on sale. These new Furbies have a new feature that has Bluetooth connection. While it seems like a cool new product it is product along with many other children’s toys and new appliances that are putting your personal life into danger.

Most people do not realize that having that having all these products hooked up to Wi-Fi and Bluetooth connection is giving anyone access basically into your home. While these new children’s toys may be convenient and easy to keep your child entertained. They keep all this information stored every time it is being used. Hackers can end up getting your mailing address, e-mail, internet history, your birthday and even the child’s birth date, video recordings and pictures of the child or anything else. It is kind of like giving your child a camera that is on record the whole time and tracks everything you do. It is just like your cell phones, they recommend wiping your whole phone once you are done with it. It is definitely something to think about while you are connecting any devices up to unsecured networks.

Information Security Intern with Westinghouse

Westinghouse Electric is looking for an Information Security Intern. The internship will take place during the summer and will be focused around Cyber Forensics and Information Security. The initial project of the internship would be working in the company’s forensic and investigation area to consolidate systems images for archives. The intern will produce a prototype of a low cost intrusion detection system, using commercial “off the shelf” technology.

Qualifications:

  • Rising junior or senior
  • Line of study should be around Cyber Forensics and Information Security
  • Familiar with Systems and Network Administration
  • Software development background (but not an extensive developer)
  • Coursework completed in Network or Systems Administration

To apply for this internship, please send your resumes to: nolffca@westinghouse.com. The internship will take place in Cranberry Woods, PA. Students must apply by Sunday, April 30th. For more information, click here.

Securing What You Don’t Own or Control – The Current State of WiFi-Security

On Thursday, February 9th, there will be a presentation entitled “Securing What You Don’t Own or Control – The Current State of WiFi-Security,” by Rick Farina. Farina will talk about how to protect data and systems from the expanding WiFi threat landscape. The presentation will take place from 4:30pm to 5:30pm in the Wheatley Atrium. This is a Top Secret Colonials sponsored event.

Rick Farina is a well-known wireless expert who has spoken at a variety of security conferences, including DEFCON (which is one of the world’s largest annual hacker conventions). Farina runs a Wireless Capture the Flag contest at several conventions throughout the country. Farina is the director of Research and Development at the company Pwnie Express. He is responsible for researching, developing, and marketing leading wireless and IoT (Internet of Things) security products. Farina’s expertise is in wireless security and wireless hacking.

Refreshments will be available at this event. Students will receive SET credit for attending. For more information about the event, contact Dr. Paullet at paullet@rmu.edu.

For more information about Pwine Express and Rick Farina, click the links below:

Pwine Express Official Website

Rick Farina’s LinkedIn Profile

TSC Logo

Russian Hacking Panel

The University of Pittsburgh will be hosting a panel on Russian Hacking on Thursday, February 2nd, from 1:30pm to 4:30pm. At this event, several panelists will discuss a variety of topics, including: Russian activities in cyberspace, U.S. and Russian views on cyber tool usage, U.S. response to Russian activities, and Russia’s possible effect on the U.S. presidential election.

There will four panelists at this event:

  • Andrei Soldatov, a Russian investigative journalist and security services expert
  • Ellen Nakashima, a national security reporter for The Washington Post
  • Luke Dembosky, a former Deputy District Attorney General for National Security and former U.S. Department of Justice representative at the U.S. Embassy in Moscow
  • Keith Mularski, a Supervisory Special Agent for the FBI in Pittsburgh

The event will be streamed live at law.pitt.edu/cybertalk. Students can only attend the event at the University of Pittsburgh if they have already registered for it. Registration for the event closed yesterday, January 30th. However, everyone is welcome to watch the event live through the link above.

For more information, there is a flyer posted below.

Russian Hacking Panel Flyer

Alert: Employment Scams Targeting College Students

The Internet Crime Complaint Center (IC3) has issued an alert on employment scams that target college students.  The scam involves phony job opportunities that may be advertised via college employment websites or sent via email (targeting bank accounts).  For additional information and examples of phony emails, please see here.

DHS 2017 Secretary’s Honors Program Cyber Student Volunteer Initiative

The U.S. Department of Homeland Security (DHS) is pleased to announce the launch of the 2017 Secretary’s Honors Program Cyber Student Volunteer Initiative for current undergraduate and graduate college students. This program is a part of the Department’s efforts to build a cybersecurity talent pipeline by working with secondary, post-secondary institutions and other key partners in academia and the private sector. Through the Secretary’s Honors Program Cyber Student Volunteer Initiative, students are able to learn about the DHS cybersecurity mission by completing hands-on cybersecurity work and building technical experience in key areas such as digital forensics, network diagnostics and incident response.

In the 2017 Secretary’s Honors Program Cyber Student Volunteer Initiative cycle, more than 50 student assignments are available at over 40 local DHS field offices across the country. Participating DHS Components include Customs and Border Protection (CBP), Immigration and Customs Enforcement (ICE), National Protection and Programs Directorate (NPPD), Management Directorate/Office of the Chief Information Officer (OCIO), Office of Intelligence and Analysis (I&A), Office of Policy/Cyber, Infrastructure and Resilience Policy, Transportation Security Administration (TSA), and United States Coast Guard (USCG).

The Secretary’s Honors Program Cyber Student Volunteer Initiative application period is open for applications from December 14, 2016 to January 20, 2017 through USAJOBS.

Mobile Forensics and Security Certificate

Robert Morris University’s Department of Computer and Information Systems is offering a new certification program: Mobile Forensics and Security. The program, which is offered both in-class and online, gives students hands-on experience with a variety of computer and mobile forensic tools. The program also teaches students about the legal procedures for computer and mobile forensic analysis. It also examines various techniques for preventing unauthorized attacks on mobile devices and computer networks.

The Mobile Forensics and Security Certificate has the following class requirements:

  • Intro to Decision Support Systems (INFS 1020)
  • Mobile Security Policy (INFS 3110)
  • Intro to Computer Forensics (INFS 3120)
  • Cyberlaw (INFS 3170)
  • Digital Evidence Analysis (INFS 3190)
  • Mobile Forensics (INFS 3191)
  • IT Security, Control/Assurance (INFS 3222)
  • Computer and Network Security (INFS 3235)
  • Network Forensics, Intrusion Detection, and Response (INFS 4180)

Most of these classes are already requirements for students majoring in Cyber Forensics and Information Security. However, this certificate is available for anyone who is willing to take these courses.

The following brochure has more information about the certificate: mobilecert

If you have any other questions, please contact Dr. Paullet at paullet@rmu.edu.