0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Footprinting and Reconnaissance
By: Raul Pop
August 17, 2017

Today I am going to give you some tools to explore the Footprinting and Reconnaissance . For the new people on this long trip, enjoy the ride and good luck on your studies! For questions or help on how to use these tools, I will be glad to help you so feel free to contact me anytime. 1) ...

Cyber Pop: Pretty Good Privacy
By: Olivia
August 16, 2017

Privacy is a topic that the security community can never give too much attention. To. For those with an online presence, it is especially important to consider who has access to your information. One common method for doing so through an encryption method called Pretty Good Privacy (PGP) . What is Pretty Good Privacy (PGP)? Developed ...

Best PST Recovery Tool to Repair Highly Corrupted Outlook Files
By: justin hansen
August 16, 2017

Author Bio: This organization has been the creation of one of the best software solutions amongst which, one Outlook application is presently considered one of the best PST recovery tool solutions. Summary: Outlook PST files being one of the most commonly used email platforms is discussed here along with the issues faced by its users that ...

A Multi Layered Approach to Security with a Difference
By: mysticman2k
August 16, 2017

So we’ve all heard of a multi layered approach to Security, well I recently decided that we should consider adding an additional layer. With the ongoing rise of ransomware threats (and now ransomware that seeks out and encrypts backup files as well as shadow copies), the weakest link is generally the end user. This means we are ...

What You Should Know About the Judy Malware
By: Apurv Singh Gautam
August 16, 2017

A new widespread malware has been detected on the Google’s official Play Store. It has infected more than  36.5 million  Android users. 41 apps developed by a Korean company named Kiniwini, registered on Google Play as ENISTUDIO Corp. have been found as infected. The reason for the enormous spread:  The malware has successfully bypassed the Google ...

Why Insiders Are the Biggest Threats to Your Sensitive Data
By: superv3k900
August 16, 2017

By Stephen Voorhees, CISSP, Veriato The latest breach from an NSA contractor should remind everyone of a grim truism about leaks: the greatest threats to an organization come not from the outside, but from those within. Fact is, insiders pose a greater risk to your cyber security than the sum of all outside pernicious actors. It’s not that insiders ...

Your Complete Guide to Fuzzing
By: Olivia
August 15, 2017

What is fuzzing? A black box software testing technique, fuzzing is a more refined version of trial and error, used to discover coding errors and security vulnerabilities in software. It involves imputing large amounts of random data, known as ‘fuzz,’ into the target program until one of those permutations reveals a vulnerability. If a ...

A+ 902 Transcender Practice Test Question Preview
By: Olivia
August 15, 2017

CompTIA A+ 220-902 is the second of two exams required to obtain your CompTIA A+ certification . This exam covers installing and configuring operating systems including Windows, iOS, Android, Apple OS X and Linux. It also addresses security, the fundamentals of cloud computing and operational procedures. It tests for the fundamentals of computer technology, networking and security, ...

Hardening the Private Sector
By: jeffcyber-2016
August 15, 2017

With the appearance of the ‘WannaCry’ ransomware attack, we are once again faced with the reality of an unprepared and understaffed response to a large scale malware attack. The private sector companies, both national and international need to spend the time and money to harden their systems. The need to take a tactical defensive stance increases every day. Firewalls ...

Your Complete Guide to Burp Suite
By: Olivia
August 14, 2017

Since web applications offer data access to customers, employees, and other key groups, they have become a weak link for many organizations. If a hacker gains access, they often have direct access to confidential data, meaning that web application security testing should be a high priority to businesses today. Complete testing of a web-based system before going ...