Category Archives: mobile technology

Summer Internship at American Eagle Outfitters

American Eagle is looking for summer interns to work on a three month project, from May to August. The internship will take place at 540 Keystone Dr. Warrendale, PA. The intern must be available 7AM-6PM, Monday through Friday. They must also have their own transportation.

For this project, American Eagle will be starting an iPad deployment in all of their stores. They are going to be upgrading all the iPads at the Warrendale location and shipping them out to the stores. These devices are used to check out customers, look up inventory, and process orders. They are a critical part of the store’s profitability.

Job Description:

During this project, our techs will be responsible for re-imaging and upgrading each iPad and packaging and shipping them to the stores. After they arrive at the stores, our technical professionals will be responsible for working with the store managers to make sure the product is effectively working.

In the morning, techs will be responsible for calling into the stores and answering calls from the stores. All work will be done remotely; they will never be on site. When taking calls from the stores/calling in, they will be speaking to the store manager to walk them through how to deploy the new device. This will require them to go into the iPad’s settings and set up the system to effectively work in the store. They will be given a script and they will be responsible for deploying multiple products in one store. This takes time and patience. They must be able to break down technical steps in a through manner to non-technical people.

In the afternoon, they will be responsible for the clean-up in all stores. To clean up, they will be using a mobile device management technology called AirWatch. They are going to set up the tracking of these devices through AirWatch. They are not responsible for shipping out iPads to stores or from stores; vendor will be doing this.

Skills:

1.) 6 months+ of experience with MDM (Mobile Device Management) — must have understanding of tool and what it does; American Eagle is using AirWatch but can have any type of MDM.
2.) Must have strong understanding of MAC, Apple products.
3.) Strong customer service and multitasking skills.
4. ) Cisco, router, switch, command line experience is a plus.

For more information about this opportunity, contact Cassidy Rizzo at casrizzo@TEKsystems.com.

Positions Available at MITRE

The MITRE Corporation has announced several unique and exciting job opportunities.

Why choose between doing meaningful work and having a fulfilling life? At MITRE, you can have both. That’s because MITRE people are committed to tackling our nation’s toughest challenges—and we’re committed to the long-term well-being of our employees. MITRE is different from most technology companies. We are a not-for-profit corporation chartered to work for the public interest, with no commercial conflicts to influence what we do. The R&D centers we operate for the government create lasting impact in fields as diverse as cybersecurity, healthcare, aviation, defense, and enterprise transformation. We’re making a difference every day—working for a safer, healthier, and more secure nation and world. Our workplace reflects our values. We offer competitive benefits, exceptional professional development opportunities, and a culture of innovation that embraces diversity, inclusion, flexibility, collaboration, and career growth. If this sounds like the choice you want to make, then choose MITRE—and make a difference with us.

Available Positions:
Systems Engineer
Multi-Discipline Systems Engineer
Model-Based Systems Engineer

Required Qualifications:
B.S. or M.S. in Systems Engineering or related engineering degrees e.g., physics, mathematics, electrical engineering, computer science/engineering, mechanical engineering, cybersecurity engineering, industrial engineering, biomedical engineering, engineering management, aerospace engineering.

If you have completed or are currently working on any engineering academic projects such as design of a mobile or web app, development of a data analytics algorithm or application, or breaking or hardening of an IT system, please indicate this on your resume.

If interested in a position at MITRE, please forward your resume to Kimberly Harrington at knharrington@mitre.org for immediate consideration.

Dr. Karen Paullet presents NSF-funded research on Mobile Forensics & Security at the RMU Research & Grants Expo

paullet-nsf-grant-expoOn April 24, 2017, RMU held a Research & Grants Expo highlighting a variety of faculty research and grant projects.  All of the RMU campus was invited to attend this event.  Dr. Karen Paullet presented the Mobile Forensics and Security Project, an NSF-funded grant.  Dr. Paullet is the PI on the grant, along with Dr. Jamie Pinchot (Co-PI), Dr. Sushma Mishra (Co-PI), and Dr. Fred Kohun.  Mobile security and forensics is an underrepresented area of study that is increasingly important in our current society.  This research will advance knowledge in the field of mobile cybersecurity and mobile forensics through a train-the-trainer program for 50 faculty members from universities across the United States.  Twenty-five faculty were trained in July 2016 and the remaining half will be trained this year.  Dr. Paullet also highlighted a new online certificate offered by RMU in Mobile Forensics and Security (MFS).  This certificate is now available and you can learn more about it here: Mobile Forensics and Security Certificate Program.

Mobile Forensics and Security Certificate

Robert Morris University’s Department of Computer and Information Systems is offering a new certification program: Mobile Forensics and Security. The program, which is offered both in-class and online, gives students hands-on experience with a variety of computer and mobile forensic tools. The program also teaches students about the legal procedures for computer and mobile forensic analysis. It also examines various techniques for preventing unauthorized attacks on mobile devices and computer networks.

The Mobile Forensics and Security Certificate has the following class requirements:

  • Intro to Decision Support Systems (INFS 1020)
  • Mobile Security Policy (INFS 3110)
  • Intro to Computer Forensics (INFS 3120)
  • Cyberlaw (INFS 3170)
  • Digital Evidence Analysis (INFS 3190)
  • Mobile Forensics (INFS 3191)
  • IT Security, Control/Assurance (INFS 3222)
  • Computer and Network Security (INFS 3235)
  • Network Forensics, Intrusion Detection, and Response (INFS 4180)

Most of these classes are already requirements for students majoring in Cyber Forensics and Information Security. However, this certificate is available for anyone who is willing to take these courses.

The following brochure has more information about the certificate: mobilecert

If you have any other questions, please contact Dr. Paullet at paullet@rmu.edu.

Beware, iPhone Users: Fake Retail Apps Are Surging Before Holidays

In the past few weeks, there have been hundreds of fake retail and product applications in Apple’s App Store. The fake apps have pretended to be companies such as Dollar Tree, Foot Locker, Nordstrom, and Dillard’s. A company that tracks new shopping apps, Branding Brand, reported a large increase in these fake applications in the past few weeks.

The apps are being created to trick Black Friday shoppers into clicking them. Some apps seem to be harmless, just displaying pop-up ads whenever users click on them. Others, however, are dangerous because users can have their credit card information stolen if the app asks them to input it. Also, some of the apps can contain malware that can steal personal information and even lock the victim’s phone.

The fake apps came from developers in China; they were somehow able to get past Apple’s review process for new apps. Apple’s app screening process is less strict than Android’s; Apple focuses more on blocking malicious software and does not routinely examine the thousands of new apps that are sent to them everyday. It is important for brands and companies themselves to search for and report these fake apps, similar to how they search for and report fake websites. Last week, however, Apple did remove hundreds of fake apps after an article was published about the apps. A spokesperson for Apple claims that they have set up ways for customers to report fake apps. In September, Apple started to look through their two million apps to remove fake and unnecessary ones. Despite this, new fake apps continue to appear.

A recent example of a fake app was one called Overstock Inc. – apparently named to let customers believe that it was the real company app for Overstock.com. The developer of the app is the Chinese company Cloaker Apps. The CEO of Cloaker, Jack Lin, claims that the company only provides the back-end technology for the apps; they do not investigate their clients. However, not even Cloaker is what it seems; the company’s website states that its headquarters is in the middle of Facebook’s campus in Menlo Park, California. When Jack Lin was first interviewed, he claimed that the company only had offices in China and Japan. When asked about the office in California, he claimed to have “tens of employees” there.

China is, by far, the biggest source of fake applications. Many of the fake apps have red flags to show that they are not real, including: nonsensical menus in broken English, no reviews, and no history of previous versions of the app. So far, thousands of individuals have apparently fallen prey to the newest fake apps. However, in most cases, no serious problems have occurred. The fake apps usually target companies either with no apps or multiple apps. Some have even used Apple’s paid search ads to put their fake apps at the top of the search results.

Fake apps on Apple are a new problem, occurring more commonly in the past few months. However, with Black Friday soon approaching, it is important to remember to check the applications that you are planning to download. Also, if possible, try to use alternative methods to applications that ask for banking or personal information. For example, try to use the company’s website on your laptop or computer; also, remember to check the security on the website itself. Criminals are obviously going to take advantage of whatever situation becomes available to them. Therefore, you should always be careful of what you click or download on your phone or computer.

Article Link: Beware, iPhone Users

12-Hour Gaming Event

The Top Secret Colonials will be hosting a 12-hour gaming marathon event on campus on Saturday, November 12th. The event will take place from 11am to 11pm in the Ferris Ballroom in Yorktown.

The event is Bring Your Own Equipment: screens, servers, consoles, etc. TSC will provide necessary power and Ethernet connections.

The cost to attend the event is $5. All proceeds will be donated to Children’s Miracle Network hospitals. SET Credit will also be given for attendance. Food and drink will be provided.

Email John Weingartner at jtwst256@mail.rmu.edu if you have any questions about the event.

Inspiring Improvement in the Field of Automotive Cybersecurity

A few weeks ago, I submitted a post about cybersecurity in the automotive industry, specifically about Volkswagen’s foray into invested into cybersecurity for automotive computers. Earlier today, the U.S. National Highway Traffic Safety Administration (NHTSA) suggested that automakers should “make shielding the electronic and computer systems of vehicles from hackers a priority, developing layers of protection that can secure a vehicle throughout its life.” These are not enforceable rules, but strong suggestions from one of the government institutions that are partially responsible for the creation of future regulations that will more strictly govern the automotive industry as a whole.

The NHTSA poses many potential security upgrades in their proposal, entitled “Cybersecurity Best Practices for Modern Vehicle.” Some of these suggestions are moves that manufacturers, like Volkswagen, are already putting into place. Most of the proposals made in the proposal are becoming standard operating procedure for automotive companies, while other suggestions are less likely to be taken into consideration. One proposal in question relates to the disclosure of proprietary information about critical components of electrical and data systems within vehicles. Jonathan Allen, acting executive director of the Automotive Information Sharing and Analysis Center, explained in an interview that this section of the industry is incredibly competitive and that companies will probably avoid disclosing this information until they are required to.

As I mentioned in my last post, the threat of automotive hacking, while still extremely small, is becoming an increasing threat. As companies begin to offer significant vehicle upgrades through wireless data links, much the same as Tesla has been over the past few years, the need for secure connections will continue to grow. Massachusetts Senator Ed Markey agrees with this sentiment and stated in an interview today that “if modern day cars are computers on wheels, we need mandatory standards, not voluntary guidance, to ensure that our vehicles cannot be hacked and lives and information put in danger.” I couldn’t agree more with this sentiment. As technology continues to impact our lives in increasingly different ways, the need for knowledgeable cyber security experts will continue to grow.