0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Cyber Security Chronicles 5: Threat Prevention Tools
By: THE CYBER EAGLE (CYBER SECURITY + NETWORK SPECIALIST)
November 30, 2017

Cyber Security Chronicles 5 Education: Cybersecurity’s Forgotten Remediation & Threat Prevention Tool             The overall practice of cyber security is a vital part of a financially healthy and successful corporate environment. In the past companies have traditionally not made cyber security a top priority. However, this has changed in recent times because ...

WMI and C# - Part One
By: beller0ph0n
November 27, 2017

WMI and C# - Part One In the series of articles titled "WMI and C#" we will learn how to harness the power of C# and WMI. In this first article, we will learn what is WMI and how to connect to it remotely using C#. WMI – what is that? WMI stands for Windows Management Instrumentation and ...

UNM4SK3D: Uber, GitHub, and White House
By: Olivia
November 24, 2017

#hacked  Shut up and drive. More like, "Shut up and don't tell users we were hacked." It has been discovered the ride service with the already questionable reputation, Uber, suffered a massive data breach in 2016. What's worse, they paid the hackers $100,000 to keep quiet.  According to Bloomberg, the data of 57,000,000 drivers ...

Types of Training Delivery Methods: The Right One for You
By: Vikrant Saran
November 24, 2017

The different types of training delivery modes are Classroom, Live Virtual, On-Demand, Bootcamp and One-on-one Training. You may choose any one of these as per your convenience and availability, as all of these training modes have proved to be highly effective and fruitful. Classroom Training This is one of the best choices for those looking for highly ...

Awareness Training for Everyone
By: Leandro Ribeiro
November 23, 2017

As you may (or may not) know, in these days Cyber Extortion is a frequent problem. There is news about this issue each day.  In May, I went to Vancouver, Canada, and during the connection between Houston and Vancouver, I met a U.S. lady aged about 70 years. During the flight, we talked about many things and ...

What are Bundles on Cybrary?
By: ginasilvertree
November 22, 2017

Do you buy bundled or bulk items when you shop at traditional or online stores? Buying in bulk (or buying bundles ) is most often cheaper - or at least it should be! - than buying single items. Plus, in addition to lower costs, they should be getting a bunch of cool items in one package, hence the ...

Encryption In-Depth: Keyfiles
By: Sean Mancini
November 22, 2017

You may have seen some applications that have encryption options such as Kepass or Veracrypt where you can create a "keyfile". But what is a keyfile and what is its purpose?A keyfile is a file with an encryption key that is randomly generated either by entering random text and numbers or moving a mouse around the key values that are generated are then ...

Certified Ethical Hacking (CEH) — What You Need to Know
By: Tatianna
November 21, 2017

What You Need to Know Malware is evolving. As noted by Tech Republic , new strains such as fileless malware — which as the name suggests don’t use typical payloads but instead leverage trusted process such as PowerShell to gain system access — are ten times more likely to succeed than their file- dependent counterparts. According to Beta News ...

Equifax Breach: Everyone is Compromised
By: Aman2406
November 21, 2017

Data breaches were never contemplated as a fortune but some of them are palatable as compared to others. We can digest that our servant got hacked instead of our banks. And the most troublesome breaches would be related to our personal information which involves insurance records, medical history, banking details, social security number and much more which are hard ...

Why Krack Attack Will Make You Question Everything
By: Aman2406
November 20, 2017

On 6 th August 1991, a powerful invention came into existence, the Internet. Since its introduction, it has made a huge impact on the society, which later demanded the invention of WI-FI in the year 1997. The invention was responsible for wireless standardization which was introduced by a community called IEEE802.11. They introduced WI-FI for Home ...