0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Best Practices to Identify Malicious Applications in Android
By: Dr. Michael J. Garbade
October 10, 2018

Android is a significant platform for mobile operators, which boasts of more than a billion users globally and a market share of about 80%. However, the platform is a target for malware schemers who are constantly infringing on the security of Android devices. Sunil Kumar , who is an India-based cybersecurity professional and currently ...

Typo Squatting Domains
By: peternovack
October 10, 2018

On September 9 th of 2017 Equifax the Credit Ratings major of U.S.A was in news. Now to those who are aware of the process it might not be something of a shock, after all, it just announced a major breach that affected almost half of America's population and the way they handled the issue was also ...

Top 4 Benefits of VMware Training Courses
By: Vikrant Saran
October 9, 2018

Back in the days, if you want to invest heavily in your business establishment, you needed hardware units and servers to meet business requirements on a growing scale. In recent times; however, VMware virtualization has changed the scenario.With the new technological advancements and advent of cloud computing and virtualization, enterprises can now run many servers and desktops on a ...

How to Recover Data from Corrupted Pen Drive in Windows 10
By: lauramathews
October 9, 2018

Pen drive stores all types of data like images, videos, audio’s, files and folders etc. But pen drive data is always prone to lose due to virus attack, improper ejection, human error and suddenly system shut down etc. You don’t know how to recover data from corrupted pen drive in Windows 10. If you are facing these issues then ...

Hacking: What's Real?
October 9, 2018

In honor of October being Cybersecurity Awareness Month (NCSAM), I want to make it clear: No system is secure. It's our duty to make them secure and reliable. We, the Cybersecurity Experts! BY-PATHANGE BALAJI RAO We are very much concerned about our money and out data resulting from the time and privacy.We always ...

Securing Critical Infrastructure in the Digital Age
By: Tatianna
October 9, 2018

This blog is sponsored by Cisco and was originally posted on their blog by: Anthony Grieco September 26, 2018 We know adversaries have the expertise and tools necessary to take down critical infrastructure and systems that cripple entire regions. These critical systems are essential to our global economy, ...

Making the Case for Virtualization
By: Tatianna
October 9, 2018

Virtual Value — The Business Case for Virtualization Management The market for virtualization is growing: Recent predictions suggest steady growth in the data virtualization market over the next four years to more than four billion dollars, even as companies come to grips with the widening gap between critical IT jobs and the number of skilled professionals ...

Everything to you should know about Ethical Hacking
By: sourajeet
October 6, 2018

In today’s world, we hear the word hacking very often. Sometimes we hear of celebrities, or even your neighbors' accounts were hacked. But do we know what hacking actually is? Not really, at least many people don't fully understand it. Whenever people hear the word “hacking”— Facebook, Instagram, Twitter or WhatsApp is what usually comes to mind. But it's ...

Best RAID Recovery Software Till Date
By: martinhoff6
October 5, 2018

Summary – As a System Administrator, handling RAID arrays, you might have come across data loss situations due to RAID Controller/Card failure or any other reason leading to failed RAID arrays. In this article, we present an advanced RAID recovery software to date to rescue this situation. Read on to know more about the software utility, its features, ...

Netcat Vs Ncat—The Big Confusion!
By: Dr. Michael J. Garbade
October 4, 2018

Netcat and Ncat are tiny but robust tools that are used for reading from and writing to network connections using the TCP or the UDP protocol. The two tools are feature-rich and can function both as clients and servers. Transformers , who has extensive experience in penetration testing ...