0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

The Next Level of Security Threats: Doxware
By: Lawrence King
January 19, 2017

Estimated reading time: 2.5 minutes IT security threats are constantly evolving. Criminals create new threats and new ways to bypass security as soon as IT professionals learn about current ones.  As infrastructures are hardened with new technology, criminals find that it easier to manipulate end users to do their work. Ransomware attacks have taken advantage of ...

Information Security Controls
By: Admin Anthony
January 19, 2017

Estimated reading time: 3.5 minutes Information Security is the way to ensure the confidentiality, integrity, and availability of information within an organization. Confidentiality, the information has been protected from authorized entity. Integrity, the information had been protected from unauthorized modification. Availability, the information is there when require accessing by authorizing users. To obtain the ...

Website Protection with htaccess
By: Romansh Yadav
January 18, 2017

Estimated reading time: 1.5 minutes Hello everyone,   Many experts say that nothing is secure. I agreed, but if one is a programmer as well as a security expert, then we can make ...

Network Security vs. Endpoint Security is the Boxing Match of the Year: Who Wins?
By: Olivia
January 17, 2017

327 new threats every minute. More than 5 every second. That’s the state of the world’s threat landscape according to Avecto. As you can probably guess, the challenge for organizations and their dedicated cyber security teams lies within the sheer volume of threats and being able to keep up with those threats.According to the Ponemon Cost of Malware Containment report, ...

Become an Expert in any Subject Without Visiting the Library
By: rcubed
January 17, 2017

Back in the old days (pre-internet), writing research papers for school was an arduous task. The process began with badgering my poor mother into dropping me off at the public library and then returning several hours later to retrieve me. My badgering was often at a fevered pitch since I’d usually wait until the day before the ...

Best Security Podcasts for 2017
By: Willian
January 17, 2017

Estimated reading time: 4 minutes It's time to get into gear for 2017.One of the most important aspects of being a security professional is staying up to date with trends, best practices, and current events. News websites and other social media websites are great ways to keep up, but people often forget the value that podcasts bring ...

How to Protect Online Privacy
By: Faustino50
January 17, 2017

Estimated reading time: 2 minutes Hello everyone,I am new on 0P3N, but I love contributing to the community.Let’s dive into the topic! How can we protect our online privacy through internet browsers with simple plugins and search engine settings?Here’s where it gets good ;) Firefox/Chrome/Opera HTTPS Everywhere: This plugin is created by ...

SQL Injection: Best Practices and Projects
By: Romansh Yadav
January 16, 2017

Estimated reading time: 1.5 minutes Hello everyone,Most people think that they know SQL injection. Some people may think that SQL injection is limiting in how it passes the login form. But, SQL injection covers a large area of research.First, let's take a look it what SQL injection is.Well, SQL injection is a way or technique that can fool the ...

Visibility is the New Stealth!
By: Muhammad Ali Hassan
January 15, 2017

Estimated reading time: 1 minute As technology advances so is the surveillance and invasion of our privacy.For a few decades, tech giants, people, human rights activists, and several other groups have been trying to come up with a way to avoid or block surveillance and hence there are a number of inventions to handle that matter.However, the ...

Admin Arsenal - A Godsend for Small and Medium Sized Businesses
By: Tatianna
January 14, 2017

Estimated reading time: 3 minutes If you work for a small or medium sized business I can assure you that finding a reliable and cost-effective systems management solution is no easy task. If working as a Cyber Security Analyst has taught me one thing, it is that you can only protect what is visible and known. If ...