0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Cyber Pop: Pretty Good Privacy
By: Olivia
August 16, 2017

Privacy is a topic that the security community can never give too much attention. To. For those with an online presence, it is especially important to consider who has access to your information. One common method for doing so through an encryption method called Pretty Good Privacy (PGP) . What is Pretty Good Privacy (PGP)? Developed ...

Best PST Recovery Tool to Repair Highly Corrupted Outlook Files
By: justin hansen
August 16, 2017

Author Bio: This organization has been the creation of one of the best software solutions amongst which, one Outlook application is presently considered one of the best PST recovery tool solutions. Summary: Outlook PST files being one of the most commonly used email platforms is discussed here along with the issues faced by its users that ...

A Multi Layered Approach to Security with a Difference
By: mysticman2k
August 16, 2017

So we’ve all heard of a multi layered approach to Security, well I recently decided that we should consider adding an additional layer. With the ongoing rise of ransomware threats (and now ransomware that seeks out and encrypts backup files as well as shadow copies), the weakest link is generally the end user. This means we are ...

What You Should Know About the Judy Malware
By: Apurv Singh Gautam
August 16, 2017

A new widespread malware has been detected on the Google’s official Play Store. It has infected more than  36.5 million  Android users. 41 apps developed by a Korean company named Kiniwini, registered on Google Play as ENISTUDIO Corp. have been found as infected. The reason for the enormous spread:  The malware has successfully bypassed the Google ...

Why Insiders Are the Biggest Threats to Your Sensitive Data
By: superv3k900
August 16, 2017

By Stephen Voorhees, CISSP, Veriato The latest breach from an NSA contractor should remind everyone of a grim truism about leaks: the greatest threats to an organization come not from the outside, but from those within. Fact is, insiders pose a greater risk to your cyber security than the sum of all outside pernicious actors. It’s not that insiders ...

Your Complete Guide to Fuzzing
By: Olivia
August 15, 2017

What is fuzzing? A black box software testing technique, fuzzing is a more refined version of trial and error, used to discover coding errors and security vulnerabilities in software. It involves imputing large amounts of random data, known as ‘fuzz,’ into the target program until one of those permutations reveals a vulnerability. If a ...

A+ 902 Transcender Practice Test Question Preview
By: Olivia
August 15, 2017

CompTIA A+ 220-902 is the second of two exams required to obtain your CompTIA A+ certification . This exam covers installing and configuring operating systems including Windows, iOS, Android, Apple OS X and Linux. It also addresses security, the fundamentals of cloud computing and operational procedures. It tests for the fundamentals of computer technology, networking and security, ...

Hardening the Private Sector
By: jeffcyber-2016
August 15, 2017

With the appearance of the ‘WannaCry’ ransomware attack, we are once again faced with the reality of an unprepared and understaffed response to a large scale malware attack. The private sector companies, both national and international need to spend the time and money to harden their systems. The need to take a tactical defensive stance increases every day. Firewalls ...

Your Complete Guide to Burp Suite
By: Olivia
August 14, 2017

Since web applications offer data access to customers, employees, and other key groups, they have become a weak link for many organizations. If a hacker gains access, they often have direct access to confidential data, meaning that web application security testing should be a high priority to businesses today. Complete testing of a web-based system before going ...

UPIS - The First ERP Solution from Serbia
By: Sasha Radenovic
August 14, 2017

It's already well known that I like, to prefer domestic IT companies, domestic solutions, it this case ERP solution form company from Serbia  IIB D.O.O.  Domestic ERP solutions are often unfairly neglected. They were created in our premises, where the changes are more frequent and unpredictable, so they are easier to adapt and update, since they are "close" to the ...