A recent survey found the rate of phishing attacks on mobile devices has risen 85% in the past year. As home to some of the top-ranked cybersecurity programs in the country, UTSA has several experts ready to discuss why these attacks remain so popular.
Cyber Crime; Data Mining and Recovery; Digital Forensics; Electronic Discovery; Information Security; Media and Network Intrusion; Organizational Information Security Management; Private Investigating
Computer and Information Security; Computer Networks
E-Commerce; Economic of Information Systems; Information Systems; Mobile Apps; Standards Competition
Computer and Information Security; Formal Method; Software Engineering
Botnet Analysis and Detection; Cybersecurity; Infrastructure Assurance; Secure Information Sharing; Secure Social Computing; Trustworthy Cloud Computing
Cybersecurity Competitions (e.g.: CyberPatriot and the National Collegiate Cyber Defense Competition)
Cloud Security; Cryptography; Malware Defense; Science of Cybersecurity