0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


According to CompTIA, the Linux+ certification offers a framework for acquiring working knowledge of Linux for IT professionals working as junior-level system administrators, as well as those working in Web and software development.Successful candidates will have the following skills: Work at the Linux command line Perform easy maintenance tasks including assisting users, ...


Today I am going to give you some tools to explore the Footprinting and Reconnaissance . For the new people on this long trip, enjoy the ride and good luck on your studies! For questions or help on how to use these tools, I will be glad to help you so feel free to contact me anytime. 1) ...


Privacy is a topic that the security community can never give too much attention. To. For those with an online presence, it is especially important to consider who has access to your information. One common method for doing so through an encryption method called Pretty Good Privacy (PGP) . What is Pretty Good Privacy (PGP)? Developed ...


Author Bio: This organization has been the creation of one of the best software solutions amongst which, one Outlook application is presently considered one of the best PST recovery tool solutions. Summary: Outlook PST files being one of the most commonly used email platforms is discussed here along with the issues faced by its users that ...


So we’ve all heard of a multi layered approach to Security, well I recently decided that we should consider adding an additional layer. With the ongoing rise of ransomware threats (and now ransomware that seeks out and encrypts backup files as well as shadow copies), the weakest link is generally the end user. This means we are ...


A new widespread malware has been detected on the Google’s official Play Store. It has infected more than 36.5 million Android users. 41 apps developed by a Korean company named Kiniwini, registered on Google Play as ENISTUDIO Corp. have been found as infected. The reason for the enormous spread: The malware has successfully bypassed the Google ...


By Stephen Voorhees, CISSP, Veriato The latest breach from an NSA contractor should remind everyone of a grim truism about leaks: the greatest threats to an organization come not from the outside, but from those within. Fact is, insiders pose a greater risk to your cyber security than the sum of all outside pernicious actors. It’s not that insiders ...


What is fuzzing? A black box software testing technique, fuzzing is a more refined version of trial and error, used to discover coding errors and security vulnerabilities in software. It involves imputing large amounts of random data, known as ‘fuzz,’ into the target program until one of those permutations reveals a vulnerability. If a ...


CompTIA A+ 220-902 is the second of two exams required to obtain your CompTIA A+ certification . This exam covers installing and configuring operating systems including Windows, iOS, Android, Apple OS X and Linux. It also addresses security, the fundamentals of cloud computing and operational procedures. It tests for the fundamentals of computer technology, networking and security, ...


With the appearance of the ‘WannaCry’ ransomware attack, we are once again faced with the reality of an unprepared and understaffed response to a large scale malware attack. The private sector companies, both national and international need to spend the time and money to harden their systems. The need to take a tactical defensive stance increases every day. Firewalls ...