0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

USB Killers on the Loose
By: intr00d
January 11, 2017

Estimated reading time: 1.5 minutes Some of you may have heard of something called  USB Killers - but what are they, and what do they do?They are intended to be malicious - potentially fatal for the motherboard and more than capable of destroying USB ports, hubs and controller boards.They are a clever concept. USB Killers take the ...

Call Me, Beep Me if You Wanna Reach Me (And Steal My Data): Malvertising in the Mobile Device Landscape
By: Olivia
January 10, 2017

Awhile back I had made a prediction in the blog ‘Palm Reading: How Hackers Steal Data from the Palm of your Hand Via Mobile Applications’ that mobile applications will become hacker’s target of choice in 2017.I decided based on some further research that it is not just mobile applications that are at risk, but mobile devices in their ...

Online Shopping and Review Sites: Getting more bang for your buck
By: rcubed
January 10, 2017

The writing has been on the wall for a while now for brick and mortar retailers. Growing pressure from online shopping sites has been taking big chunks out of their revenue year-over-year. Stalwarts of the department store industry have either gone out of business or drastically cut back on the number of stores they operate. Macy’s ...

Top 5 Highest Paying Cyber Security Certifications for 2017
By: jrinehard
January 10, 2017

In the world of cyber security, there are many certifications that will boost your career along with the lucrative financial compensations that go along with it in return for protecting our nation’s computer networks from cyber-attacks.These 5 cyber security certifications can command a six-figure salary: CISM(CERTIFIED INFORMATION SECURITY MANAGER) Skills Gained Ability to quickly ...

Using Websploit to Resolve Http Proxy Protected Websites
By: baphomet1488
January 10, 2017

Http proxy protection is a commonly used protection method that will mask a hosts location through the use of intermediary servers. The application Websploit has a very powerful tool that will help a penetration tester resolve an Http proxy protected website into host locations. This is the Cloudflare resolver. While this tool is seemingly specific to Cloudflare ...

How Hardware Knowledge Aids in Security & Hacking
By: Romansh Yadav
January 9, 2017

How does knowledge of computer hardware help us in security and/or hacking? Well, this is a very popular question people ask on Quora. First, I want to share a piece of advice: be patient and persevere. Learning ethical hacking is going to take more than one day or one month, it takes year - or longer - filled with ...

Linux in 15 Steps
By: H5p
January 8, 2017

STEP 1: Getting the date command: date STEP 2: Finding who you are command: whoami STEP 3: Clearing the terminal command: clear STEP 4: Adding a user command: adduser username STEP 5: switching the users command: su username STEP 6: Fun with directories command 1 (list out directories): dircommand 2 (create directories): mkdir directory ...

Layered Security
By: YounessTast
January 7, 2017

  Security is an important matter in every domain. It stands for the act of “protecting” assets that have a significant value. This “protection” cannot be shortened into one simple definition, for it includes several aspects depending on the nature of the asset we want to protect and its specifications. ...

Today's History: Microsoft's Unveiling and Duoscopic TV
By: Tatianna
January 7, 2017

Every day holds significance to someone, but today is special to us because of Microsoft. Founded in 1975, Microsoft is the worldwide leader in software, services and Internet technologies for personal and business computing. The company offers a wide range of products and services designed to empower people through great software — any time, any place and on any ...

A Primer on Risk Management for Information Security
By: foxpro
January 6, 2017

Cyber security is the most talked about topic these days. There is a security breach every second on this planet. Security firms state that 99% computer users are vulnerable to exploit kits (software vulnerabilities). You only have to read the everyday headlines to realize how data breach, spoof emails, and ransomware are impacting individuals, corporations, and governments. While organizations rely on ...