0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Equifax Breach: Everyone is Compromised
By: Aman2406
November 21, 2017

Data breaches were never contemplated as a fortune but some of them are palatable as compared to others. We can digest that our servant got hacked instead of our banks. And the most troublesome breaches would be related to our personal information which involves insurance records, medical history, banking details, social security number and much more which are hard ...

Why Krack Attack Will Make You Question Everything
By: Aman2406
November 20, 2017

On 6 th August 1991, a powerful invention came into existence, the Internet. Since its introduction, it has made a huge impact on the society, which later demanded the invention of WI-FI in the year 1997. The invention was responsible for wireless standardization which was introduced by a community called IEEE802.11. They introduced WI-FI for Home ...

Cyber Security Smoke and Mirrors: An Update on Russian Hacking Group Sandworm
By: Olivia
November 19, 2017

In a time where news media and social media capture so much of our attention and by extension, help to form so many of our opinions, it is not surprising the press coverage given to the hackers who tampered with the elections using those mediums has been on almost a constant loop. For some, the news is ...

Why You Should Get Your Hands on a YUBIKEY
By: Sean Mancini
November 19, 2017

I have covered the importance of MFA (Multi-Factor Authentication) aka 2-factor security with more and more vendors such as Gmail, Outlook, and others now supporting MFA there is no reason not to have it enabled. MFA  is the answer to a lot of security issues when it comes to authentication.One of the common complaints with MFA is that it is ...

The Fundamental 5 - Key Strategies to Protect your ICT Systems
By: Samantha Voss
November 18, 2017

If you're serious about keeping the hackers out, here are the fundamental 5 'must knows' for implementing key mitigation strategies to protect your ICT systems. Passwords and user credentials are the prime target of cyber attacks Protect password and privileged account access ASD recommended strategies to ...

Network Programming with Socket in Python
By: HEGA GEOFFROY
November 18, 2017

Socket Programming is a running process between computers. The process is accomplished by the communication. Generally, internet communication is the best way for communication. The implementation of this process is done with the API (Application Programming Interface) to communicate with the protocol stack.A protocol stack is TCP. UDP protocols are the combination of IP addresses, and a port protocol is ...

Hope vs. Expectation: Adapting to End User Behavior
By: Ridiahshost
November 17, 2017

There is a prevalent paradigm within the organizational cultures of many well-meaning institutions that seems to have left open an opportunity for improvement. For many people, the tired axioms of security awareness training have resulted in a devaluation of training and made less realistic the possibility of creating a security-minded culture within the workplace, as well as in our ...

UNM4SK3D: CIA, Microsoft, and IoT
By: Olivia
November 17, 2017

#wikileaks Just when the world thought Wikileaks might just stop dripping, the whistle-blower forum resumed their old ways, this time releasing source code and analysis of CIA hacking tools dubbed 'Vault 8.'  You may recall that beginning in March of last year, Wikileaks began releasing formerly confidential CIA documents under the name 'Vault 7,' ...

Beware the 'Paypai' Scam
By: prezzio
November 11, 2017

These days, we might receive a well-written email which is not so easy for a "common user" to identify and mark a message as a threat... PayPal users should pay attention to the email message with the subject: "Your PayPaI account has been Limited until we hear from you" is fake ...

UNM4SK3D: Tor, Facebook, and MantisTek
By: Olivia
November 10, 2017

#vulnerability The 'TorMoil' vulnerability has been wreaking havoc for Mac and Linux users of the anonymity browser by leaking their real IP addresses. That is, until a patch was released 11/03 for browser version 7.0.8 Want the good news first? Windows users running Tor Browser 7.0.8 were not affected and the patch is in an upgrade ...