0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Why is the IoT a Threat to Internet Security?
By: Sean Mancini
May 26, 2017

The new wave of the internet is among us. We are now in the era of the “Internet of things," (IoT) sensors and devices that connect to the internet from your home IP.  Does your fridge have a computer component that tells you the weather? What about a fridge that can connect to your mobile phone ...

The Raison D’etre behind User Behavior: The Future of Cyber Security Analytics
By: dasabiro
May 26, 2017

The purpose of this article is to demonstrate an analytic maturity model through which cyber security experts/institutions can assess their progress in the use of user behavioral analytics to forge the thorough scrutiny in applying security postures that safeguard confidentiality, integrity and the availability of data to the right user primarily eliminating nuance.   ...

Hermes 2.0 Ransomware
By: Maundrey Wilton Kock
May 25, 2017

Ransomware viruses have become a popular tool used by cyber criminals to exploit their victims. Once the ransomware virus finds its way into your computer it encrypts all the data on the PC, and if you want your data decrypted you are required to pay a certain amount of money via Bitcoin.Cyber criminals have now moved their focus to ...

How Can ISP's Help with DDoS Mitigation?
By: Sean Mancini
May 25, 2017

We have seen it time and time again, DDoS attacks against organizations causing network interruptions and downtime. (What else is new?) These Organizations at times are hopeless at the hands of the attackers sometimes even for ransom. Think of a small or medium business with a 50Mbps internet connection that is getting attacked. What options ...

Applying Bogon Access Lists to Networking Gear
By: Sean Mancini
May 24, 2017

Hello all, Here is a little snippet of information on the importance of applying an access list to your edge router to IP blocks that are listed on the bogon list. What is the bogon list? The bogon list is a list of IP subnets that are either invalid non-routable IP blocks such as 192.168.0.0, ...

WCRY or WannaCry Ransomware Technical Analysis
By: S-Connect
May 24, 2017

Welcome Back! As you are all aware of the facts surrounding the ransomware attacks, they are increasing rapidly from past years. Consider the biggest hits till now, you will come across these well-known names i.e. 1. CryptXXX 2. Dogspectus 3. Crypto Locker 4. Petya 5. Cerber ...

Why "Hackers" Are Important for the Virtual World
By: Umar SK Pathan
May 23, 2017

Hackers! One of the most mysterious words in the dictionary. They seek for justice in an unjustified way. They are the guardians of the internet. They are everywhere, on every computer, on every network.  Who are they? What do they want? What is their motive? Let’s find out here.Nowadays, we live in two different worlds at the same time. ...

Project Management: Construction Delays
By: themindandbeauty
May 23, 2017

  Construction Delays An Introduction I consider the construction delay as the utmost charged because it is the big obstacle that interrupts the construction projects and affects their progress. To understand the delay issue and handle its consequences, it is crucial that we investigate its ...

Construction Project Management: Contract Types
By: themindandbeauty
May 22, 2017

  Types of Contracts At the early stage of the construction projects, the essential argument that disturbs the owner and contractor is accepting a suitable form of the contract that meets the common objectives. (Elbeltagi, 2009). Specifying the suitable form of the contract is the first step to confirm the ...

Ransomware Apocalypse: WannaCrypt Is the the Largest Virus Attack in History
By: David Balaban
May 22, 2017

The extortion virus called WannaCrypt has infected tens of thousands of computers around the world. It has paralyzed the work of British hospitals and Spanish companies, and then made its way to Russia, attacking the regional departments of the Ministry of Internal Affairs and the Investigative Committee.Kaspersky reports that tens of thousands of computers in 74 countries ...