0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.



Estimated reading time: 4 minutes It's time to get into gear for 2017.One of the most important aspects of being a security professional is staying up to date with trends, best practices, and current events. News websites and other social media websites are great ways to keep up, but people often forget the value that podcasts bring ...


Estimated reading time: 2 minutes Hello everyone,I am new on 0P3N, but I love contributing to the community.Let’s dive into the topic! How can we protect our online privacy through internet browsers with simple plugins and search engine settings?Here’s where it gets good ;) Firefox/Chrome/Opera HTTPS Everywhere: This plugin is created by ...


Estimated reading time: 1.5 minutes Hello everyone,Most people think that they know SQL injection. Some people may think that SQL injection is limiting in how it passes the login form. But, SQL injection covers a large area of research.First, let's take a look it what SQL injection is.Well, SQL injection is a way or technique that can fool the ...


Estimated reading time: 1 minute As technology advances so is the surveillance and invasion of our privacy.For a few decades, tech giants, people, human rights activists, and several other groups have been trying to come up with a way to avoid or block surveillance and hence there are a number of inventions to handle that matter.However, the ...


Estimated reading time: 3 minutes If you work for a small or medium sized business I can assure you that finding a reliable and cost-effective systems management solution is no easy task. If working as a Cyber Security Analyst has taught me one thing, it is that you can only protect what is visible and known. If ...


You heard right! We finally have an app for iOS. Yes, the long awaited and severely overdue iOS app is now more than a dream. And, for those of you who use Android, we didn't forget about you. We created an all-new app for android to match 1 for 1 the iOS app. Don't worry though if you have ...


Estimated reading time: 1 minute This is a very quick guide for installing the Social Engineering Toolkit (or SET) onto an OS X machine. This is also going to be the first in a series of hacking related articles. What is SET? The Social Engineering Toolkit is a software tool that is ...


#hacked (again). Someone's flexing their cyber muscles. It appears as though the recent attack on a Ukrainian transmission facility points to a person or group using the country as a trial for refining attacks on critical infrastructure that could be used across the world. Because practice makes perfect, right? The first attack against ...


What is a Non-Certified Unethical Hacker?I was chatting with my friend who has done CEH, ECSA, CHFI, and others. He told me that certifications are important. I have not done any certifications but I have learned so much from websites like Cybrary, YouTube, etc. So, he challenged me to complete some challenges (This challenge comes in some high-profile certifications that ...


A topic we hammer on often and hard here at Cybrary.it is the critical shortage of Cybersecurity professionals and the growing demand for them. Guess what? Things haven’t changed and the shortage and corresponding demand only continue to increase at a rapid clip during 2017 and beyond. We could probably make the same post week after week with a ...