Tag Archive for: Named

Dampier named dean of College of Engineering and Computer Sciences | News


HUNTINGTON — David A. Dampier, Ph.D., has been appointed as dean of the College of Engineering and Computer Sciences at Marshall University, effective July 3.

Dampier has served as interim dean for the past year and previously served as associate dean for research and a professor of computer science at Marshall.

“I am proud to be working with such a superb staff and faculty in the college,” Dampier said in a news release. “We have worked very hard this year to make the college more efficient and strengthen our core capabilities. We have increased our research expenditures and publications. In the future, we look to continue to streamline our programs and grow our student body at both undergraduate and graduate levels. This includes proposing a new doctoral program in engineering that will serve the entire college.”

According to the release, Jaime R. Taylor, provost and senior vice president for academic affairs, met with the college’s associate dean and chairs and requested input from the faculty, who showed overwhelming support to Dampier’s appointment as permanent dean.

“I’ve been very pleased with Dr. Dampier since his appointment as interim dean of the College of Engineering and Computer Sciences (CECS) in August of 2020,” Taylor said in the release. “He has very quickly enhanced Marshall University’s relationship with Marshall alumni, local industry and several federal granting agencies. He has also positioned the college for further growth by collaborating with other colleges on strategic degree program development. It has always been clear to me that Dean Dampier’s desire is to do what is in the best interest of Marshall University and for the students and community it serves.”

Prior to joining Marshall in July 2019, Dampier was the chairman of the Department of Information Systems and Cyber Security at the University of Texas at San Antonio and founding director of the Distributed Analytics and Security Institute at Mississippi State University. He has 70 peer-reviewed publications and more than $50 million in external funding.

Before higher education, he spent 20 years as an Army automation officer.

He has a Ph.D. in…

Source…

Idaho National Laboratory: IDAHO HIGH SCHOOL STUDENTS NAMED NATIONAL CYBER SCHOLARS, AWARDED SCHOLARSHIPS – India Education | Latest Education News | Global Educational News


Idaho National Laboratory: IDAHO HIGH SCHOOL STUDENTS NAMED NATIONAL CYBER SCHOLARS, AWARDED SCHOLARSHIPS – India Education | Latest Education News | Global Educational News | Recent Educational News

Source…

3 Wheeler High Students Of Cobb County School District Named Scholars In National Cyber Scholarship Competition


May 18, 2021

After a rigorous 48-hour online competition sponsored by The National Cyber Scholarship Foundation (NCSF), three Wheeler High School students were named Scholars in the National Cyber Scholarship Competition (NCSC). Jenna Bond, Archishma Goli, and Christina Nikolova were among the top 540 highest scoring students who met the eligibility criteria for a $2,500 Scholarship to a U.S. college of their choice.

A fourth Wheeler student, Natalie Ajemian, was named a finalist in the competition. The Cobb students are all members of Wheeler’s Girls In Cyber Security Club, which is sponsored by teacher Jennifer Callison-Bliss.

In recognition of their achievement, all four Wheeler students earned an invitation to participate in the Cyber Foundations Academy –a multi-week online program based on the nationally recognized SANS Foundations training course and certification –valued at more than $3,000.

The Wheeler students competed against 5,000 high school students in a cybersecurity competition designed to challenge its participants to solve computer security problems and/or capture and defend computer systems. Only 10% percent of the 50,000 students nationwide who sought to qualify for the NCSC met the requirements.

“The National Cyber Scholarship Competition recognizes high school students who have demonstrated exceptional cybersecurity prowess and who wish to pursue a career in a growing field in critical need of their talent,” noted David Brown, executive director, National Cyber Scholarship Foundation. “The NCSF mission is to identify and develop the next generation of cyber professionals. Each and every student who participated in this competition has the potential to develop their skills and build a successful career in cybersecurity.”

There are several qualification pathways for the National Cyber Scholarship Competition, including CyberStart America, a free online program that helps students discover their interest in cybersecurity and develop their talent and skills. The NCSC offers 600 college scholarships to top-ranking competitors. Additionally, National Cyber Scholars, along with competition 1,000 finalists, are invited to participate in the Cyber Foundations…

Source…

Android Malware Named TeaBot Banking Trojan Targets Sixty Banks in Germany, Spain, Italy, Belgium, and the Netherlands


Cleafy security researchers discovered a new banking trojan targeting banks in Europe. They named the new Android malware variant “TeaBot” because it is not related to other banking trojans.

The Android malware abuses Android’s Accessibility Services to overlay legitimate banking apps, intercept user actions and two-factor authentication codes, and perform arbitrary actions.

Cleafy’s Threat Intelligence and Incident Response team discovered the malware in January 2021. By March 29, the researchers detected malicious injections against Italian banks, and Belgium and Netherlands banks by May 2021.

TeaBot Android malware can stream a device’s screen and mimic user interaction

The researchers explained that the primary goal of TeaBot is stealing victims’ banking credentials for fraudulent purposes by abusing Android’s Accessibility Services.

The Android malware achieves a real-time interaction with the compromised device to bypass “new device enrollment” and perform an Account Takeover (ATO).

When TeaBot is successfully installed in the victim’s device, attackers can obtain a live stream of the device screen on demand and also interact with it.

The banking trojan can also send, intercept, and hide SMS messages to bypass two-factor authentication.

Like other Android banking trojans such as Anubis, Cerberus/Alien it overlays banks’ mobile applications to steal login and credit card information. It also observes and intercepts user actions and can perform arbitrary actions.

Unlike other banking trojans like EventBot that observe all installed apps, TeaBot only spied on selected banking applications. Consequently, it downloads specific payloads to perform overlay attacks against specific banks.

“TeaBot, during its first communications with the C2, sends the list of installed apps to verify if the infected devices had one or more targeted apps already installed,” the researchers noted.

Cleafy researchers also discovered that the Android malware sent user interaction information for specific bank apps every ten seconds to the command server. This strategy ensured that there is little traffic between the Android malware and the…

Source…