0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

PATCHING HUMAN S2PDT 102 - "Phishing Defense with OSInt"
By: strainer
June 12, 2018

Synopsis When I spoke at one of the local cybersecurity conferences in Panay last November of 2017 on " Evading Social Engineering Attack | Hacker's Frontier, " specifically with phishing , most of the approaches discussed were manual. In this article, I would like to share an approach that is automated using Open Source Intelligence ( ...

Home Network Defense Center
By: Terumo
June 12, 2018

When I test network security, I frequently get asked "How can I protect my house network?" After I discuss the "typical solutions" (good passwords, configurations, MAC filters, permissions, firewalls, IDS, etc.), some people reach the conclusion that all those solutions are "too passive." When they work, they simply block possible attacks, and we have to simply trust them to ...

How To Open an OST File In MS Outlook 2016
By: jamiekaler
June 11, 2018

An OST file is an important necessity when working with an MS® Exchange mailbox account, as it helps to provide a replica of the Exchange server account. The OST file is highly helpful in difficult scenarios when there is server downtime or some Exchange crash, or when Exchange is not available because of scheduled tasks. In such ...

How to Convert EML Files to PST File Format
By: imstefanie90
June 11, 2018

EML files are the most commonly known file format across the world. More then 30+ email clients use .eml files to store their emails/messages. EML is a plain text file that contains the header, body, and footer. EML Header - contains an email address, subject, from, to, cc, bcc, time, date, ...

Are Your Home Security Cameras Safe?
By: Jessica
June 10, 2018

You need to have eyes everywhere. With the countless sources of danger that exist everywhere from the grocery store to the park, you have to constantly remain alert and watchful. This is especially true for many when it comes to their homes, the personal sanctuaries they share with family and loved ones. Homes are major financial and emotional investments, ...

Which Image File Format Should I Use, and When Should I Use It?
By: Jessica
June 10, 2018

Whether you’re a website developer or an everyday person who occasionally uploads and shares pictures or makes scrapbook graphics, at some point, you’ve been presented with the task of having to save an image in some type of file format of your choosing. The issue is that many people, even some of the tech-savvy, have no idea which file ...

5 Best Development Practices for the Security of Mobile Banking Apps
By: Dr. Michael J. Garbade
June 10, 2018

The current trend to “mobilize” banking services is phenomenal, with several leading banks and other financial institutions embracing this wonderful technology to reduce costs, improve customer outreach, and gain a competitive edge. However, most mobile banking apps are susceptible to hacking. For example, a study by the University ...

How to Fix Outlook Error 0X800401d
By: devinsmith
June 10, 2018

Have you ever encountered the Outlook error message “An unknown error occurred, error code: 0X800401d”? Here in this blog, we are going to discuss how you can easily fix this Outlook error: 0X800401d. MS Outlook is the most popular email client for e-communication within organizations. The PST files are created automatically by Microsoft ...

DLP Regulatory Compliance: What Makes It Different From Simple Cloud DLP?
By: Ugra Narayan Pandey
June 9, 2018

To establish your stand in an IT field, it is now mandatory to use cloud computing techniques. It is so because this technology is considered to be the latest, trending, and modern way of doing business. There is no disadvantage of using this new technology, but the only thing that needs to be focused on is ...

PATCHING HUMAN STUPIDITY 101 - "Analysing Phishing Email"
By: strainer
June 9, 2018

Synopsis " The human is the weakest link in the cybersecurity chain. " If you don't know about this "gossip" yet, well, it's a fact.When we hear about phishing, our normal response is to be careful about clicking links from email content that direct us to malicious websites on the Internet, yet we tend ...