0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Bluetooth Security Risks
By: Jessica
July 29, 2018

If you’re a heavy Bluetooth user, then you’re more than familiar with how much easier it makes everyday life. It’s pretty much a multi-task facilitator. With this technology, you can make hands-free phone calls while driving, allowing you to waste no time in traveling to destinations while handling important calls safely on the road. If you’re at home, you ...

Re-Thinking Information Security: The Value of Information
By: Terumo
July 29, 2018

If someone you don't know approached you on the street and asked for your address, social security number, or ID number, would you give it?Since we consider it “personal” and a “huge violation of our privacy,” you probably wouldn’t, but since we don't think our email has the same value as a social security number or ID number, you ...

Hacking User Accounts Without Programs in Win10 Home
By: dnieves
July 27, 2018

Welcome to hacking Windows 10 Home profiles! This walkthrough only applies to Win10 Home without any encryption software. Encryption software like Bitlocker or Bitcrypt will block this capability. Win10 Pro Edition without encryption software or on a domain may work, but it hasn't been attempted yet.These issues don't come up often, but when they do, we can get frustrated. ...

A Brief History of Mobile Malware and How to Protect Your Apps
By: Dr. Michael J. Garbade
July 25, 2018

The digital space has, in recent times, experienced an increase in the number of threats that have led to fraudulent activities. Scammers and hackers usually prey on gullible individuals, swindling them of their hard-earned money as they make vendor payments or online investments. Sunil Kumar , who is an experienced cybersecurity analyst and currently teaches ...

What are Linux Runlevels?
By: Sean Mancini
July 24, 2018

Linux and Unix utilize runlevels to enable certain functionalities from single user mode to GUI mode.These runlevels cater to different needs for system administrators and for troubleshooting.You can set a default runlevel to, say, boot the CLI instead of the GUI. On servers, you generally would use Runlevel 3, which is the multi-user mode that only gives you access ...

Cryptocurrency Lesson 1: Introduction to Cryptocurrency, Bitcoin, and Blockchain
By: bjacharya
July 23, 2018

Hello and Namaste, Cybrarians. I am back with a new, exciting course series: Cryptocurrency . This is the first lesson of our course, and here, we are covering the following: Cryptocurrency Introduction Bitcoin Introduction  Blockchain Basics Cryptocurrency ...

Web Designer, Web Developer, UX Designer, and UI Designer: What’s the Difference?
By: Jessica
July 22, 2018

The Web has done a lot to transform the way we live over the years. It has changed the way that we work and communicate. Although many businesses still work with data in a hard-copy form, much of it is stored in online databases, with employees at various locations accessing it through centralized web portals. Instead of relying solely ...

What is Bluetooth?
By: Jessica
July 22, 2018

Have you ever been on your smartphone, gone to Settings, and seen a setting option that allows you to turn Bluetooth on or off, but you don’t exactly know what Bluetooth is? Maybe you’ve also wondered if it’s similar to Wi-Fi, and if it is, then why would you need it if you’re already using Wi-Fi? If you’ve had ...

Breaking Into Security Careers 2018
By: RonW123
July 22, 2018

Cybersecurity continues to be a hot career field with many job opportunities. This means more and more folks want to break into it. A common question I’m asked is, “How do I get a job in information security/cybersecurity?”  We continue seeing people who are interested, but they don’t know the steps it takes to start or ...

What Is Cloud Security Management? A Challenge For IT Growth
By: Ugra Narayan Pandey
July 21, 2018

Organizations are shifting their work on the cloud horizon to expand their businesses. While implementing and handling cloud-based projects, cloud security management comes to mind. It demands that firms determine and understand the challenges involved in the public network. Cloud information protection is quite similar to an on-premise data center’s security. The only difference between the ...