0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

How Cyber Attacks Affect Your Business!
By: thomassujain
May 7, 2018

Cybersecurity Attacks Affect Your SEO and Overall Business! Stay Secure Deploying Smart Security Measures! Every company and online businesses are aware of cybersecurity breaches! It can happen from revenue or reputation standpoint. And the result of any cybersecurity attack is the loss of business data, business reputation, and customer goodwill. And for online websites, it also affects their ...

Is Your Information on Mobile Health Apps Safe?
By: Jessica
May 6, 2018

Everything you want or need is at your fingertips with mobile devices today. You can buy groceries online and play music with the sound of your voice with smart speakers like Amazon’s Echo. This power has given people more control over their lives, and that control has also transferred into an area that impacts many: health. Mobile health apps ...

How to Keep Your Mobile Device Safe from Online Attacks
By: Jessica
May 6, 2018

When most people hear “anti-virus program” and “anti-malware,” they instantly think of desktop and laptop computers. As desktops and laptops have become life-changing mainstays in the office and home over the past 20 years, the need for protection against malicious software that can attack these computers soon followed and has become a must-have for anyone owning these devices. ...

Use Ports and Options to Identify Active Hosts and Vulnerable Services
By: Mike Ship
May 4, 2018

Nmap: Use the -sn, - -top-ports, and -sV options to Identify Active Hosts and Vulnerable Services If you are just starting out in cybersecurity and considering the area of penetration testing (Red Teaming) you may be wondering how do pentesters (or attackers for that matter) know what ports are open on ...

Advance Your SOC Career
By: Tatianna
May 3, 2018

The Education/Experience Balancing Act: Advancing Your SOC Career Hard numbers make it clear: The cyber security skills gap is real — and growing . By 2020, estimates suggest an infosec shortfall of almost two million IT professionals as companies look to shore up network defenses and respond to emerging cyber threats.The good news? Now is ...

Red Hat System Administration: Automation using Cobbler
By: variiable
May 3, 2018

Cobbler is a Linux installation server that allows for rapid setup of network installation environments. In this OP3N post, we’ll look at how to setup and configure Cobbler to be utilized in our network environment. This could be a little complex at first, but it helps a lot with installations, all you need is to integrate new packages in ...

7 Best Cyber Security Penetration Testing Tools
By: Dr. Michael J. Garbade
May 2, 2018

With the current proliferation of attacks on computer systems, proactively safeguarding your critical IT infrastructure is key. And, one of the best techniques for companies and individuals to protect themselves is through penetration testing. Penetration testing (or pen testing) refers to the technique of assessing the security of IT systems with the intention of discovering vulnerabilities—before attackers identify them. ...

A Methodology for the Study of DNS
By: ITSimeon
May 2, 2018

A Methodology for the Study of DNS Simeon Miller Abstract The evaluation of model checking that would allow for further study into spreadsheets has visualized the Internet, and current trends suggest that the improvement of IPv6 will soon emerge. Given the current status of concurrent configurations, physicists particularly desire the construction of scatter/gather I/O ...

How to Secure Small Businesses
By: Tatianna
May 2, 2018

Secure Your Small Business With Affordable and Practical Cyber Security Training “Cyber security education and training should be free for everyone, especially for small businesses,” suggested the witnesses who testified before the Senate small business committee. With data breach incidents at large companies such as Home Depot, Target, Equifax dominating the headlines, it is easy for small ...

The Influence of Autonomous Configurations on Complexity Theory
By: ITSimeon
April 30, 2018

The Influence of Autonomous Configurations on Complexity Theory Abstract In recent years, much research has been devoted to the understanding of linked lists; on the other hand, few have constructed the emulation of local-area networks. After years of key research into write-back caches, we confirm the private unification of agents and digital-to-analog ...