0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Inundated with Privacy Policy Emails and Questionable Acceptance Requests?
By: KMCLink
May 27, 2018

First, before I get down to the issue, let me apologize to the DevOPs and Marketing professionals who read this. I don’t intend to offend anyone, but I believe that after reading this, you will understand the irony and disbelief experienced by those of us trying to wade through all the new regulations and compliance being requested by the ...

Protect your computer! Let’s talk about Ransomware…
By: 奥力
May 26, 2018

Zenis, WannaCry, Bitman, Sombra, Spora, Jigsaw, Cerber, Microp, Crysis, CryLocker, Stampado, and Cryptodef are by no means all the ransomware families trying to extort money in exchange for your data. One early example of ransomware occurred in 1989 . Attackers circulated the ransomware via a floppy disk using snail mail, and it affected operating systems. ...

10 Cybersecurity Predictions for 2018
By: megmittal
May 26, 2018

Cybersecurity is now the topmost concern for all organizations. Given what happened in the previous years - the Equifax breach, WannaCry, Peta, Phishing scams, etc., 2018 is considered to be a terrifying year. Technology is getting better and so are the hackers.The predictions are that 2018 will be the year of a machine-on-machine attack. AI cyberattacks will be ...

How to Delete Data Permanently from Computer
By: arunaattri
May 25, 2018

Simply deleting a file or formatting a computer’s hard drive doesn’t actually remove the data from your hard drive. The thing is, when you delete a file, it is moved to the recycle bin, and when you empty the recycle bin or use the ‘ shift + delete ’ keys, you are actually deleting the path to ...

Getting Errors During Office 365 Email Exports to PST? Try This Export Tool!
By: magstephen08
May 25, 2018

Are you unable to export Office 365 emails to a PST file from Exchange Online eDiscovery? Say you're logged into Office 365. You're in the Exchange Admin Center and want to export your eDiscovery search results to a PST file. You select the “Export to a PST file” option but are met with an error message. To get around ...

Is it Phish? How to Detect!
By: Abishek
May 24, 2018

Let's start with "What is Phishing ?" Phishing is one of the most common types of social engineering attacks. It's an attempt technique used by malicious actors to trick the user into divulging sensitive information by disguising a trap as a trusted entity in electronic communication. Now that we know what phishing ...

How to Convert Mac MBOX to PST File?
By: martinhoff6
May 24, 2018

Mac Operating Systems support an email client named Apple Mail for users to communicate by sharing emails. The ‘Apple Mail’ email client stores all its emails in an MBOX file. To read these MBOX emails in Outlook, convert Mac MBOX to the Outlook PST file format . You need to do so because MBOX files are not ...

How To Export Lotus Notes Domino To PST Format
By: virat8586
May 23, 2018

Domino is basically an IBM server application which runs on Lotus Notes Server and is widely used by numerous user groups and business professionals. It allows users to add structural and other types of data components to the database and share their email with any application. DXL is a file format that is used extensively ...

The Spectre and Meltdown Saga Continues : VARIANT 4 - A New Vulnerability Bug for Linux Kernel
By: Monika Fulop
May 23, 2018

I have been reading daily articles regarding cyber security, as my job is to stay up to date with the current vulnerabilities that are on the rise and still ongoing.The Meltdown and Spectre incident early this year has moved all global companies towards the security mitigations that need to be done in order to overcome the exploits ...

USB Forensics: Find the History of Every Connected USB Device on Your Computer
By: Shaquib Izhar
May 22, 2018

Sometimes, we need to know what USB devices were connected to our computer in our absence. This information could be very useful for a forensic examiner or in general cases where we just want to know what USB devices were used. How This Works We all know about the registry on Windows. The registry is ...