0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Android for Business Made Clear
By: Christopher Bainbridge
June 17, 2017

With the decline of Blackberry and the increasing number of users wanting to use iOS or Android for work, this gives companies a bit of a headache due to these platforms having more complex problems than the simple deployment and management of Blackberry’s for business. For a while, iOS has been a lot more popular ...

Convert NSF to PST by Easily Exporting Files from Lotus Notes
By: kumarsandeep43
June 16, 2017

Lotus Notes is an email communication used by IBM, while Outlook is from Microsoft. Both email Clients save data in NSF and PST format respectively. To convert NSF to PST follow the below steps: Export NSF database First, launch IBM Lotus Notes and Open NSF Database to export data ...

Security Issues with SaaS and the Cloud
By: Sasha Radenovic
June 16, 2017

Data Security: Data breaches happen all the time. News reports of hacking and industrial espionage hit the headlines daily and present a serious threat to small and medium sized businesses. On-premise software still presents its own set of security concerns, but be wary of new technologies and vendors who do not have a robust security system in ...

UNM4SK3D: NSA, Hidden Cobra, and Power Grids
By: Olivia
June 16, 2017

#wikileaks (drip, drip, drip) The Cherry Blossoms that bloom around Washington D.C. have since died, but the 'Cherry Blossom' Wireless Router Hacking System is alive and well. This is the latest of the Vault 7 leaks, released June 15th.  Someone with a green thumb must have named 'Cherry Blossom,'  a framework being used by ...

WannaCrack! A Mix of Digital Forensics + Python Cracking
By: jumb01
June 14, 2017

~$ whoami I am Aslam Admani, and this is an interactive article that's most beneficial if you can practically follow along. ~$ SettingTheScene You are a digital forensic analyst. Your boss has given you a USB flash drive which was recovered from a suspect's home. He is suspected to be a fraud who is involved in credit card scams.Inside ...

How to Pass: Network+ Practice Test
By: Olivia
June 13, 2017

We've heard disappointment time and again at those who come to a certification exam feeling fully prepared, only to find out they've failed. Of those individuals, it seems a large number come to the exam with plenty of experience and assume they can get by on that alone. And while experience can certainly help, it's ...

Increase Your Demand: Top 5 Reasons to Get CCNA Certified
By: jrinehard
June 12, 2017

There are very few industries in the world that have seen the kind of growth   that we   find in IT, and it continues to grow at an   extraordinary rate. If you're currently in the IT field or thinking about making a move, you'll find an extremely rewarding career and a lucrative salary. You’ll also find that the ...

How to Pass: CISSP Practice Exam
By: Olivia
June 12, 2017

Taking a certification exam of any kind is a commitment, requiring both time and money, neither of which you want to waste. For those serious about taking the CISSP exam, you’ll want to ensure you pass on the first try. This post will offer guidance and reviews, as well as a tool to help you be successful in earning ...

Why Threat Prevention on IoT Devices is Almost too Hard...
By: Masood
June 12, 2017

  The Mirai botnet was responsible for the October 2016 attack that brought down much of our internet. The victim was Dyn, a company that provides DNS service. Distributed Denial of Service (DDOS) caused the outage, and up to 100,000 malicious endpoints were used for the attack. The malicious “endpoints” were IoT devices – digital cameras and ...

Zip Repair: Recover Corrupted & Damaged Compressed Files
By: william1234Jack
June 12, 2017

Many products are available in the online marketing arena, which claims to repair and recover corrupted zip files. But, one necessary product is the best zip recovery software - used to retrieve lost data from a compressed file. Here, we will work for users to provide an error-free ZIP Repair tool to recover corrupted, inaccessible, ...