0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Juliar Overview
By: Rattar
February 9, 2017

Intro Juliar.Future is the latest iteration of Juliar Programming Language. The compiler is built on top of JAVA, so everywhere JAVA can run, the compiler can run.  This is a huge step we've taken to eliminate having to build a compiler for each version. ...

Software Development Methodologies: Tumbling down the waterfall
By: rcubed
February 9, 2017

Picking up the thread from a previous post on structured software design and CASE, it’s worth examining some of the major development methodologies and their evolution. Where SA/SD and CASE deal with the process of designing and creating software products, methodologies are concerned with the process of getting them built. They exist within the realm ...

Tutorial: Math For Computer Science Security
By: xorinsomnia
February 9, 2017

Hello, Cybrarians! Today we will continue our discussion about Security, as mentioned in Introduction to Computer Science Security , math is the core of security, and as I promised I will try to make this part as simple as possible. Before we start our discussion, I'd like to mention that during this tutorial, you ...

Privileged Password Security: How to Protect your Organization
By: Olivia
February 8, 2017

You turn on the evening news and a breaking report flashes, “Major Data Breach of Huge Corporation, details at 11” and you immediately begin to question, “could this happen to my organization?” In the wrong hands, privileged accounts represent the biggest threat to enterprises and unfortunately are a reality for many companies who are not exercising the right precautions.According to ...

What is the Role of a White Hat Hacker?
By: Alfie
February 8, 2017

Breaches. Breaches. In the past two years, we have read, witnessed or even been affected by attacks even on some fortune 500 companies. The attacks have become sophisticated, notorious and devastating. This calls for advanced blue team efforts which should be focused and relentless. For all we know, the attacker is always ahead.Most companies I have interactions with have ...

Why I Started a Cyber Security Internship Program
By: pweithers
February 8, 2017

One of my challenges during my tenure in college was the discovery of new and creative ways to make learning and retention easier for myself. I made note of the positive effects of activities which created reinforcement, and a sense of confidence over the subject matter. Eventually, I observed that hands-on interaction during events such ...

Incytes: Micro Certifications by the Numbers
By: Olivia
February 7, 2017

     *Data as of 2/7/17 Data is a beautiful thing. In many ways, it's almost artistic because it can help us paint a picture of abstract concepts. You may have questions about Cybrary Micro Certifications, 'who's taking them and what do they certify?' We hope this info graph can provide ...

Tax Refund Scams: Benefits to filing early and often
By: rcubed
February 7, 2017

The two constants of the universe are death and taxes, however, advancements in life extension and anti-aging research threaten to up end the former. Taxes are eternal and in some cases, literally. Estates and heirs are often hounded by the IRS for the tax obligations of the deceased. In the event that death is eventually knocked from ...

CTF Insomnihacking Teaser 2017 Challenge Write-up
By: Motasem
February 7, 2017

This challenge requires skills both in exploit development, reverse engineering and writing scripts using python. In this challenge we got a file named“baby-6971f0aeb454444a72cb5b7ac92524cd945812c2.tgz”After extracting this file we’ll be presented with two files; “baby” and “libc.so”. Our targeted file that we’re required to exploit is “baby”. As we get used to doing when analyzing and reversing binaries and files especially ...

HIPAA Covered Entities are Still on their Heels.
By: mkuntz2
February 7, 2017

  Estimated reading time: 2 minutes The Healthcare industry in the US as a whole is still on its heels when reacting to cyber security issues and the lack of industry standardization is not helping business decision makers manage this aspect of their business. A lack of industry standardization ...