0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Who's Really to Blame for Compromised Passwords?
By: sf_dod
February 23, 2018

When a password is compromised and ultimately leads to a breach, whose fault is it? Most people would place the blame on the employee whose password was compromised and argue that they failed to create a strong and secure password. On the other hand, blame could be placed squarely on the shoulders of the IT administrator ...

Export Apple Mail to Windows Outlook 2016, 2013, 2010, 2007, 2003
By: techalphy
February 22, 2018

The MAC OS running the OS X 10.0 or later versions has Apple Mail as an email client by default. This has a lot of features which can be advantageous to the users. This is naturally preferred by the Mac users, but there might be various reasons prompting a user to transfer or export Apple Mail to Windows Outlook. ...

The Evolution of Malware
By: Olivia
February 21, 2018

We’re pleased to be partnering with Cisco for this blog. Scroll down to download the Cisco 2018 Annual Cybersecurity Report  As many cybersecurity professionals know, the threat landscape is continuing to become more complex, with large increases in cybercriminal activity around the world. 2017 was no exception. In their Annual Cybersecurity Report (ACR), ...

Hacking Database
By: Sahad Mk
February 21, 2018

Hi dear hackers. Hacking database is a pretty cool thing you wanna do. Why databases? Certainly its about the information it holds such as passwords, credit card numbers even your girlfriend's phone number. So here I'm going to explain how can we hack into databases using sqlmap which is based oSQLql injection. So you ready? Ok let's begin. Before you ...

Cryptocurrency Mining: Malicious Money Making
By: Olivia
February 20, 2018

It’s no surprise that cryptocurrency has been in the news lately. Between the rising popularity of Blockchain technology, the fluctuating value of cryptocurrency, and the creation of new currencies almost daily, many individuals (and hackers) have jumped on their chance at turning a profit from cryptocurrency. What has emerged from this trend is a wave of malicious money making via ...

Pfsense (Spanish)
By: wrboliveira
February 20, 2018

Bom dia, empresários que precisam de um bom suporte de TI venham para a wtech suporte informatica, podemos lhe oferecer o melhor em gerenciamento de redes e segurança contra invasão e sequestro de dados, proteja suas informações e tenha total controle do que acontece em sua rede de computadores e internet.O PFSense é uma ferramenta baseada em ...

Coinhive: A JavaScript Cryptocurrency Miner
By: atom2018
February 20, 2018

As the title says, Coinhive is a JavaScript Cryptocurrency miner for Monero Blockchain. This piece of script, provided by the Coinhive website, offers a another source of income for any website administrator. Any website admin can sign up for Coinhive and can embed the JavaScript miner to their websites. When any user visits the website, ...

How Skywire and the Decentralized Internet Will Protect You Online
By: skycoin
February 19, 2018

When you build a new internet which is based on a wireless mesh-network you want to make sure it gives the best possible solution to end users rather than just being seen as a gimmick. Luckily this is precisely what has been done with the developers of Skywire. With ...

What is Ransomware? How to Restore Your Data After Ransomware Attacks
By: semnaitik
February 18, 2018

Last year in May 2017, the world had witnessed a severe cyber attack, called WannaCry Ransomware attack. This cyber attack had targeted only the Windows users all around the world and demanded a ransom in the form of Bitcoin cryptocurrency. It was considered a network worm because it uses a ...

A Fix: Microsoft Outlook Continually Keeps Asking for Password
By: martinhoff6
February 18, 2018

Summary : With the launch of Windows 10, applications like Microsoft Outlook underwent many significant transformations. For example, once Outlook was installed and configured to be used with the new operating system, users reported facing unexpected errors like repetitive prompts to re-enter their login password. Usually, the reason behind such erratic Outlook behavior is some problem with its ...