Pima Community College opens new auto tech center to meet high demand for technicians

Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being.

Pima Community College unveiled its new automotive tech center in downtown Tucson with a goal to help meet high demand for skilled technicians in the industry, including Arizona’s growing electric and autonomous vehicle manufacturing sector. 

The opening of the Automotive Technology and Innovation Center is just the start of a major effort by the district to expand technical training to produce tech workers in other fields and stimulate the local economy. 

Lee Lambert

It’s also the realization of a long sought-after goal for Chancellor Lee Lambert, who came to the district in 2013. 

“I think there’s many of you in this community, I know especially the dealers and all the other automotive folks, you’ve been waiting for this moment,” Lambert said at the recent ribbon cutting for the center. 

Programs in diesel, electric and autonomous vehicles 

Located at the school’s downtown Tucson campus, the two-story, 50,000 square feet center will support programs in diesel, electric and autonomous vehicles and increase training for specific brands such as Ford, Fiat-Chrysler and Subaru. 

Students can study engine diagnosis and repair, electrical fundamentals, steering, alignment, brakes and other programs. 

Education paying off for grads 

Automotive technicians who complete a two-year Automotive Technology Associate degree earn over 20 percent more, on average, than a technician without a degree, college officials said. An automotive technology degree also is a step towards other careers in the field, whether as a dealership manager, mechanic, salesperson or specialist focused on improving the future of automotive technology, school officials said.

Technicians in Arizona are earning an average $22.41 per hour, about 8 percent higher than the national average, according to employment website Indeed.  

Severe auto tech shortage 

There are plenty of positions available for grads. By 2024, the industry is projected to be short by approximately 642,000 automotive, diesel, and collision technicians, according to a report issued by the Phoenix-based TechForce Foundation last year.

Citing both…


NSA Opens Door to Domestic Internet Spying, Privacy Advocates Say

Protect yourself from online attacks that threaten your identity, your files, your system, and your financial well-being.



The latest king-sized, disastrous hack into U.S. government and corporate data servers is prompting the head of the National Security Agency to suggest that a surveillance giant built to look at foreign threats might need even greater powers to spy on internet usage domestically.

Doing so, privacy advocates say, jeopardizes an already weakened four-decade old compromise of national-security surveillance. NSA access to the digital trails of U.S. persons and foreigners transiting domestic communications infrastructure is supposed to require a warrant from a secret court specifying specific suspected worrisome activity. But it’s unclear how early detection of foreign-borne digital threats, particularly at scale, could operate within the same legal paradigm.

“Like clockwork,” said Sen. Ron Wyden (D-OR), a member of the intelligence committee, “advocates of expanded surveillance are trying to exploit an intelligence failure.”

Gen. Paul Nakasone, the director of the National Security Agency and its conjoined military twin Cyber Command (CYBERCOM), did not offer any such answers in recent congressional testimony about the devastating SolarWinds hack, in which malware inserted into IT software used by several U.S. government agencies resulted in data exfiltration that Microsoft’s Brad Smith has called “the largest and most sophisticated” cybertheft yet. Instead, Nakasone highlighted to legislators what he described as a dangerous blindness in cyberspace created by holding the domestic internet off-limits to him.

“We truly need to look at the ability for us to see ourselves and right now it’s difficult for us to see ourselves,” Nakasone testified on Thursday to the Senate Armed Services Committee. Adversaries like China and Russia “are operating with increased sophistication, scope [and] scale, including operations that can end “before a warrant can be issued,” he warned.

“If we have a problem where we only see our adversaries when they operate outside of their country and we don’t see them when they operate inside our country it’s very difficult for us to be able to—to, as I say, connect those dots,” Nakasone said. “That’s something…


Latest Microsoft Hack Opens Door For New OZ Attacks – channelnews

Australian businesses who use Office 365 or Microsoft’s Exchange email service are facing new security threats as hackers and ransomware groups take advantage of a major hack on Microsoft servers that resulted in a free-for-all as hackers hunt down unpatched email servers to attack.

Right round the world Microsoft servers have been exposed with one problem being ransomware groups who are using the flaw to install malicious programs.

Once these programs are installed the perpetrators locks away a user’s data behind strong encryption, making the computer system unusable.

The group then demands payment to unlock it – and if demands are not met, will steal, or delete the data.

Initially, the flaw was being exploited by a hacking group to gain remote access to email servers, from which it could steal sensitive data.

But after Microsoft warned the world it had identified the problem and urged all its users to download a new security updates, other hacking groups quickly became familiar with the flaw.

The UK National Cyber Security Centre said it estimated 7,000 servers had been affected by the flaw and only half had been secured.

The agency said it was “vital” that all affected businesses took action to secure their email servers.

The announcement reveals the scale of the problem among companies for the first time since the global security flaw emerged last week claimed the BBC.

The NCSC is particularly concerned about small and medium-sized businesses that may not have heard about the issue.

“We are working closely with industry and international partners to understand the scale and impact of the exposure, but it is vital that all organisations take immediate steps to protect their networks,” NCSC’s director for operations Paul Chichester warned.

“While this work is ongoing, the most important action is to install the latest Microsoft updates.”

About Post Author


Unpatched Bug in WiFi Mouse App Opens PCs to Attack – Threatpost

Unpatched Bug in WiFi Mouse App Opens PCs to Attack  Threatpost