0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

What You Should Know About Spear Phishing Attacks
By: Willian
June 7, 2016

In the past few months, we've heard about a range of business email compromises. Spear phishing, the method used in these attacks, represents consistent threats that have companies on high alert.These attacks are growing in number and are getting more sophisticated in nature - targeting individuals and employees in various organizations to gain entry into a corporate network. Traditional ...

3 Reasons Why EVERY OS Fails as an OS
By: Daelphinux
June 7, 2016

3 Reasons Why EVERY OS Fails as an OS I recently read a post regarding Windows’ failings as an operating system and decided to call out some issues with every OS in the same format. I’m only going to focus on the three biggies: Windows, OSX, and Linux .Moreover, I’m going to focus Linux on ...

[Product Update] Introducing the New Course Catalog
By: TREVORH
June 6, 2016

Today, we're introducing the new course catalog on Cybrary. To date, Users have had limited flexibility when it comes to sorting through our course catalog. Taking into account some great User feedback, we've included the ability to filter classes by difficulty, vendor, and added Learning Paths.Learning Paths are designed to provide Users with recommended course paths for careers they may ...

Tutorial: An Introduction to Software Defined Radio
By: The Rapture
June 6, 2016

Introduction: Hey Cybrarians!  I bought a USB Software Defined Radio (SDR) dongle last year at DerbyCon and hadn't really had the chance to play with it until the other day. It was a lot of fun to explore all of the different signals that you can pick up with one of these dongles, so I thought ...

ISP's Connect You to the World
By: Dr3AMCoDeR
June 6, 2016

Hello there Cybrarians,As always, I appreciate your huge support and comments. That's why I've decided to write another article today which might be useful for you. I'm going to discuss everything about ISP's (Internet Service Providers) because many people have asked me, "How does an ISP work and what do they know about us (the clients)?".My discussion will be ...

Video Tutorial: XSS – Cross Site Scripting
By: xyra
June 5, 2016

Cross Site Scripting is the consequence of a vulnerability in websites or client software. It allows an attacker to inject his/her own malicious code. It's used either to trick the user to believe that the injected code is part of the website or to run scripts which are not distributed by the website itself. Do you know the difference ...

The Theory of the Dot: How We Surf the Internet Incorrectly
By: Rattar
June 5, 2016

 You may not know this, but we're surfing the Internet incorrectly. That's right, when we go to Google or Cybrary, we type: www.Cybrary.it or www.google.com , but we're forgetting the most important symbol, the dot (.) at the end of the domain.  According to https://www.dns-sd.org/trailingdotsindomainnames.html : "It's a little-known fact, but fully-qualified ...

Sunday's Cyber Security Fact: Breach Detection (June 5th, 2016)
By: ginasilvertree
June 5, 2016

"The majority of data breach victims surveyed, 81 percent, report they had neither a system nor a managed security service in place to ensure they could self-detect data breaches, relying instead on notification from an external party. This was the case despite the fact that self-detected breaches take just 14.5 days to contain from their intrusion date, whereas breaches ...

End Point Protection: Your First Line Of Defense
By: Willian
June 4, 2016

For a long time, the main focus of many organizations was to have a solid protected network perimeter by installing the most powerful shiny firewall/IPS/IDS they could afford. This could help them keep intruders from trespassing inside their networks.The end point (host) protection was always considered the last line of defense and never treated with the same priority as ...

CyberPop - What's "Dwell Time?"
By: ginasilvertree
June 4, 2016

CyberPop is a quick way to learn more definitions and facts about cyber security.  Today's Question: What's "Dwell Time?"   Answer: "Duration, usually in days, that a vulnerability or infection remains undetected within a network or environment. (Some also define it as the time between detection and remediation, or even total time from infection to remediation.)" Browse courses and ...