0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Beware - Facebook Messenger & the Spread of Locky Ransomware
By: indrajeet
November 26, 2016

  Have you came across any Facebook Message with an image file of .SVG file format ? If not then you are lucky and if you received it then avoid clicking it.If clicked, the file would eventually infect your PC with the nasty Locky Ransomware, a family of malware. In a short ...

Information Disclosure ( Gitignore files ) - Whatsapp
By: vinothpkumar
November 26, 2016

Hi Readers, While conducting an assessment in WhatsApp web application, I noticed the  .gitignore file was being exposed. What are .gitignore files? This is a user defined file which tells the “git” not to track certain files. For example: If you add a ...

Target Security Breach and the Value of Pentesting
By: rcubed
November 25, 2016

Being that it’s Black Friday, I thought it only fitting to revisit the infamous Target Security Breach of holiday shopping seasons past. For Cybrarians, there’s a lot to take from the case, particularly in the area of pentesting and fundamental network security best practices. And finally, there are the painful lessons of the high cost ...

An Introduction to Hacking (Pen Testing)
By: Mahroof CM
November 25, 2016

Now-a-days most of the people are crazy and desire to become a hacker, hacking is not an art that can be mastered overnight. It requires knowledge, skills, creativity, dedication and of course the time. In simple, hacking is a technical skill of a person. So it is good to have some extra skills ...

Emerging Ransomware Threats
By: Clouds
November 24, 2016

  One day after installing an XYZ application from an unknown developer my phone started reacting weirdly and by weirdly I mean some text was displaying on the screen stating “Pay 3 Bitcoin and get access to your phone”. I have no idea as what to do! To access my own phone I have to pay ...

The dark side of programming
By: Rachel Laura M
November 24, 2016

Even though the average person might not be aware of it, software is everywhere in our daily lives. Everything from online transactions, buying a smartphone, to driving a car involves software. As consumers, we assume and take for granted that the software used to take care of things in our daily lives will not only work as we need ...

State of the Art Wifi Security - Part 3 - Best Practices
By: siva
November 24, 2016

Introduction With increased usage of Wi-Fi, you can always except internet security and privacy issue to grow with time. Once cannot stay away from the usage of wireless networks but with a few precaution and implementing security best practices one can possibly keep data safe . ...

Data Security Breaches: Superman’s Kryptonite
By: Olivia
November 23, 2016

Dust off your comic books, Superman is back.Imagine this: In the latest issue, Superman sets up a secure perimeter around Metropolis. Or at least, he thinks it’s secure. While he’s leading his other life as Clark Kent, Lex Luther takes advantage of his accidental neglect to breach the boundaries Superman has set up, destroying the lives of millions in Metropolis ...

[podcast] BlackNurse, Buenoware, ICMP, Atombombing, and PDF converter fails
By: BrBr
November 23, 2016

[embed]https://traffic.libsyn.com/brakeingsecurity/2016-046-BlackNursebuenowareIoTpwnage.mp3[/embed] This week, Mr. Boettcher found himself with an interesting conundrum concerning what happened when he converted a Windows DOCX file to a PDF using a popular#PDF converter software. We discuss what happened, how Software Restriction Policy in Windows kept him safe from a potential malware infection, and about the logging that occurred.After that, we discuss some recent vulnerabilities, like the ...

Virtualization Softwares x64bit - OS List Problems Not Listed
By: obuntu
November 23, 2016

How solve x64bit not showing in VirtualBox and VM Ware Problem A lot of people do get across this problem of their system not showing x64bit among the list of OS in their VIRTUALIZATION SOFTWARES or Not Functioning, and blame their OS, Processor, the system manufacturers, the software and so on.well this problem is mainly because ...