0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

How College Grads Learn New Skills & Gain Experience
By: kamransharief
August 28, 2017

How Gig Economy Helps College Grads Learn New Skills & Gain Experience The career world has rapidly changed and these days, long-term careers and people working in just one job are slowly but steadily becoming a thing of the past. In fact, according to research, in the year 2015, between three people, one person in Australia was ...

File Conversion: OST to PST Converter Tool
By: NicoleMcGlenn
August 28, 2017

Anyone who works with Exchange mailbox accounts in offline mode needs OST file for Outlook which stores your mail and data. The OST file gets synced when Outlook is connected to the server. This is useful when the server has a maintenance or crash or any other issues. But, if you need it on a different computer, usually ...

How To Repair PDF Files
By: lucasdawson1984
August 27, 2017

In this ever-changing world, a new stride in the field of technology is being made every day. The newest and latest technologies are being replaced by even newer and better versions of the same. However, some advancements create a turning point in their particular field. Advancements so noteworthy that they are later referred to as 'Legendary'. PDF (Portable ...

Which Certification is Easier, CEH or CISSP?
By: priyajatoliya
August 26, 2017

IT security certifications are critical for a career in the world of cyber security. But in order to get into the world, you have to clear certification exams that meet the industry parameters and standards. There are two points to a business’ security - the first is testing vulnerabilities of a testing system and the second is the management ...

Cyber Security Chronicles - Chapter 4
By: THE CYBER EAGLE (CYBER SECURITY + NETWORK SPECIALIST)
August 25, 2017

Cyber Security Chronicles - Chapter 4, Anatomy of a Hacker: The Color Guard When you think of the word hacker, you probably have negative thoughts automatically rush to the forefront of your brain. However, there are several different types of hackers and a great majority of them are actually on the ...

UNM4SK3D: CIA, Google Play, and PlayStation
By: Olivia
August 25, 2017

#wikileaks  The floodgates that are Wikileaks have yet to close. Another week has passed with yet another leak, the latest dubbed 'ExpressLane,' a tool which allows the CIA to spy on intelligence agencies such as the Federal Bureau of Investigation (FBI), Department of Homeland Security (DHS) and National Security Agency (NSA) while secretly ...

Targeted, Technical Certifications - $600 for an $18K Raise?
By: misturbusy
August 25, 2017

Targeted, Technical Certifications: $600 for an $18,000 raise? Now this probably won't come as a surprise at all to those who've spent a few years in cyber security organizations, but for those looking to get into cyber security, or are early on in their path, I think this is valuable information. I did some ...

Cyber Pop: Biohacking
By: Olivia
August 24, 2017

In the not so distant past, opening doors with a wave of our hand seemed like something you’d see only in a Harry Potter film. Now, with biohacking, this ability has become possible. We are modifying human bodies to meet our technological needs. By embedding a microchip under your finger, you can open doors, unlock your computer, ...

Recovering a Stolen Car Using Code
By: Brian Scott Luke, MBA
August 24, 2017

Just a fun article on how basic technical and networking tools can help an information technology help desk recover a stolen automobile and laptop.  Scenario:  The call could come in like this “Yeah, Hello? Yeah I had my company car stolen.” Okay, thank you for confirming your identification. Was your automobile lo-jacked? “No.”  Okay, when ...

Security as a Service: SECaaS
By: Sasha Radenovic
August 24, 2017

Cloud computing, hosted services, and applications on demand redefined the way users access and exchange data, but security solutions have remained stuck in the past, cluttered with complicated architecture and limited thinking. The solution brings cloud, i.e. Security-as-a-Service (SECaaS).Companies that want to resist threats must consider a new security methodology, as traditional solutions encounter very serious challenges: ...