0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Demystifying Modern Sorcery (Coding)
By: RedRum69
November 30, 2016

Coding (or programming/black magic) is one of those things everyone talks about, acknowledges that everyone needs to know something about, but barely anyone actually does. Coders have this weirdly conflicting aura; they are the kingmakers, modern day sorcerers who, with seemingly an incomprehensible wave of the hand, can conjure a piece of software out of thin air, and in many ...

Palm Reading: How Hackers Steal Data from the Palm of your Hand Via Mobile Applications
By: Olivia
November 29, 2016

Today, I’m a psychic.And my prediction for the upcoming year is this: Mobile applications will become hacker’s target of choice.According to Dr. Larry Ponemon, Chairman and Founder of the Ponemon Institute, a research think tank dedicated to advancing privacy and data protection practices, “The average organization tests fewer than half of the mobile applications it builds, and 33 percent of ...

Big Mac Attack: Is the Apple Macintosh Virus-Proof?
By: rcubed
November 29, 2016

The age-old battle of supremacy between PC and Mac users dates back to the introduction of the first Mac back in 1984. I jumped on the Apple bandwagon back then with a purchase of the original Mac 128k machine. I loved it and the MS DOS machines I was using at work couldn’t hold a candle to ...

10 Steps to Prepare for & Mitigate Cyber Attacks in Healthcare Industries
By: Motasem
November 29, 2016

Hi Everyone,I created an infographic for mitigating cyber attacks in the healthcare industry, but I realized that it might be easier if I also included a text version that is easy to copy/paste text from. So here it is. Recent cyber attacks targeted healthcare organizations should not be ignored because as cyber security is important for banking industry or ...

Add Program to Windows "RUN" Command Executor
By: obuntu
November 29, 2016

ADD PROGRAM TO RUN COMMAND EXECUTOR Ther RUN program is a small program that is  used in quick command execu tion , without going into the Command Prompt.   SECTION ONE: SETTING PROGRAM ...

The Dangers of a Root Account and Security
By: cheawick
November 29, 2016

I'm surprised I have not so far found an article addressing this to date. Should I be wrong, please advise.Many users of moderate level computer knowledge tend to forget about the Root account, that first account made at the time of setting up a new pre-built laptop, PC or even a new OS install so you can get on ...

10 Security Tips to Protect Yourself from Being Hacked
By: Mahroof CM
November 28, 2016

  1.       Password Security 1.1 .    Don’t use common words, period! Or something equally predictable onto a common word. It is a fact that about more than 20% of all passwords are easily guessable. Example: 12345, QWERTY, your ...

The Journey of Penetration Testing
By: Hari Charan
November 28, 2016

I just wanted to give you an overview how one can be a Penetration Tester . I’m not gonna talk about career opportunities here since I do believe that a security enthusiast will always be passionate about information security, having a sense of how networks work and systems work. So, this article will shed ...

Python Guide Part 2
By: ziednamouchi
November 28, 2016

This is a completion of the first article Python Guide Part 1: https://www.cybrary.it/0p3n/python-guide-part/ This article is about very basic and common input/output commands in python programming, as well as statements, itterator, import, and functions. 1/ Let's start with input: We use input (input or raw_input) functions to read from the ...

Linux Commands Most Used by Attackers
By: toxicptr
November 27, 2016

This article explains which are the Linux commands most used by attackers and how to defend against these attacks . Although the solutions are based on Linux they work on other Unix-like systems as well. The commands were obtained from a study by D. Ramsbrock, R. Berthier and M. Cukie from the ...