0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Knowledge Is Power: Your Journey On Cybrary
By: ginasilvertree
December 20, 2017

You may have heard the expression, "Knowledge is power" and, if not, you've heard it now!People around the world come to Cybrary for IT/cybersecurity training and tools that help them gain knowledge and ultimately, power - power they apply and leverage to change their lives and circumstances. And with more than 1.4 million users, Cybrarians' lives and circumstances are ...

Market Trends of 2018
By: Samantha Voss
December 20, 2017

  The Market Constantly advancing, the Cybersecurity space continues to disrupt the market. As Digital Marketers, it's crucial that we frequently analyze our consumers naturally adapting attitudes, ensuring that we continue to meet their expectations of the 'latest and greatest'. Both the Technology and Cybersecurity Industries are growing exponentially. This is great from a market growth perspective, but ...

Online Security: Always be Humble, Kind, and Smart
By: Brian Scott Luke, MBA
December 20, 2017

  Annually, internet-based criminal activity costs the American public billions of dollars and businesses due to the necessity to repair computer systems hit by cyber-attacks. When cyber-attacks and ID theft occur the costs may be passed down to consumers, systems and additional authentication may be required to counter various types of criminal activity, such additional ...

Python data_exfiltration with socket programming and network
December 19, 2017

 dataexfiltration is the technic used by the hacker for unauthorized the transfer of data of victim Computer in the hacker computer. The hacker used malicous program to upload in the remote computer and after when the victim computer are infected , the hacker take the control of remote computer and start to exfiltred the data or files ...

Juliar Blue: Simulating Network (Virtual) under VM
By: Rattar
December 19, 2017

Hey Everyone,I haven't posted anything in a while but now I am back.My team and I are currently working on a new Juliar.Future release codenamed Juliar.Future Blue.Mostly we want to remove the old interface, and replace it with a new "Drag and Drop" design. One of the features that we are working on is an ability to quickly ...

The Flaws of Privacy
By: Terumo
December 19, 2017

"Privacy" is a interesting, and very commonly misundestood, concept in IT. Lots of security flaws online can have its origins on this misunderstanding, hence the relevance of clearly all this. This topic is relevant for both security and programming perspectives.Privacy for humans is, (most of the time) simple. When we tell someone "this is private", ...

Are iPhones Safe from Virus attacks?
By: karel11
December 18, 2017

In June 2012, Mikko Hypponen, an anti-virus veteran, shared an exciting tweet which said — "iPhone is 5 years old today. After 5 years, not a single serious malware case. It's not just luck; we need to congratulate Apple on this." It is a matter of time. ...

Why Should You Go for a Security+ Certification?
By: netcomlearning
December 18, 2017

We are currently living in an era that is highly impacted by technology. From our day to day living to all essential tasks, we are immensely surrounded by technology. Going with the tide, if there is a good investment in today’s time then it surely is in technology. Today, IT certifications are an investment ...

UNM4SK3D: Net Neutrality, Starbucks, and ROBOT
By: Olivia
December 15, 2017

#badnews Today was a sad day for the Internet and sites like Cybrary. The Federal Communications Commission voted today to deregulate the broadband industry and eliminate net neutrality rules that "prohibit Internet service providers from blocking and throttling Internet traffic."  For those of you have been following the news, there's been much debate surrounding ...

Equifax and Never Look Back (Wrong!)
By: Olivia
December 13, 2017

One of, if not THE most notable breach of 2017 was revealed by Equifax Inc. (NYSE: EFX), in which their organization was hacked through the exploitation of “a U.S. website application vulnerability to gain access to certain files. Based on the company’s investigation, the unauthorized access occurred from mid-May through July 2017.” This exploit lead to the compromise of sensitive ...