0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

State of the Art Wifi Security - Part 3 - Best Practices
By: siva
November 24, 2016

Introduction With increased usage of Wi-Fi, you can always except internet security and privacy issue to grow with time. Once cannot stay away from the usage of wireless networks but with a few precaution and implementing security best practices one can possibly keep data safe . ...

Data Security Breaches: Superman’s Kryptonite
By: Olivia
November 23, 2016

Dust off your comic books, Superman is back.Imagine this: In the latest issue, Superman sets up a secure perimeter around Metropolis. Or at least, he thinks it’s secure. While he’s leading his other life as Clark Kent, Lex Luther takes advantage of his accidental neglect to breach the boundaries Superman has set up, destroying the lives of millions in Metropolis ...

[podcast] BlackNurse, Buenoware, ICMP, Atombombing, and PDF converter fails
By: BrBr
November 23, 2016

[embed]https://traffic.libsyn.com/brakeingsecurity/2016-046-BlackNursebuenowareIoTpwnage.mp3[/embed] This week, Mr. Boettcher found himself with an interesting conundrum concerning what happened when he converted a Windows DOCX file to a PDF using a popular#PDF converter software. We discuss what happened, how Software Restriction Policy in Windows kept him safe from a potential malware infection, and about the logging that occurred.After that, we discuss some recent vulnerabilities, like the ...

Virtualization Softwares x64bit - OS List Problems Not Listed
By: obuntu
November 23, 2016

How solve x64bit not showing in VirtualBox and VM Ware Problem A lot of people do get across this problem of their system not showing x64bit among the list of OS in their VIRTUALIZATION SOFTWARES or Not Functioning, and blame their OS, Processor, the system manufacturers, the software and so on.well this problem is mainly because ...

3 Steps to Protecting Your Data in the Cloud
By: prezzio
November 23, 2016

There are different types of cloud storage available on the market in different price ranges, but anyway, you need to choose a solution with services that are accessible from any device, with high levels of protection for business and personal data (with strong encryption for data stored and in transit) and reliability.   ...

TCPING - NMAP's Cousin
By: kj2015
November 23, 2016

TCPING is a utility that operates similarly to PING; however, it works over a TCP port. This utility can be very useful for troubleshooting network connectivity and performance issue at Layer 3 and Layer 4. TCPING can also speak HTTP. If the '-h' flag is used, tcping will connect and attempt to download the given URL over HTTP in ...

Mobile Malware Now Equals PC Infection Rates
By: rcubed
November 22, 2016

There are currently 2 billion smartphone users in the world. These users have amassed over 268 million downloads. It should then come as little surprise that cybercriminals have turned their attention to attacking mobile devices and the users to which they’re attached. Mobile devices infected with malware currently stands at 1.12% as reported by IBM ...

State of the Art Wifi Security - Attack on WPA / WPA2 Encryption - Part 2
By: siva
November 22, 2016

Introduction: The security weaknesses of WEP led researchers to  design a new standard under the name 802.11i. The main security protocols of the 802.11i standard are the Wireless Protected Access (WPA) and the Wireless Protected Access II (WPA2). Although these protocols provide significant higher security level than WEP they also present serious issues ...

Nerding Out: Top 7 Most Interesting Cyber Crime Books You Should be Reading
By: Olivia
November 22, 2016

My Kindle is my best friend. There I said it.And if you’re like me then chances are you want to soak up every ounce of knowledge you can when it comes to the topics you love. Books are a great source for that, and expanding your interests to the furthest corners of the industry will only help you become a ...

Is a degree in cyber security worth it?
By: Rachel Laura M
November 21, 2016

The following statistics are very sobering and disturbing: More the 80% of US-based companies have been hacked This number includes major companies such as Target, Sony, and Home Depot These incidents caused consumer’s sensitive personal and ...