0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

A Buzzword to Rattle your Brain
By: Olivia
December 2, 2016

Updated October 2018 I’ve got a buzzword for you. ‘Deep learning.’Perhaps you’ve heard of it, or maybe not. But if you’ve been following the IoT trend like I have, you’ll hear its praise there.Deep learning is a branch of machine learning, and the one you can thank for improved voice search on smartphones and better image recognition ...

Brain Token: A Multi-factor Authentication Enhancement
By: Ridiahshost
December 2, 2016

A solution for the possibility that a targeted password manager or vault may be compromised. This also serves as a multi-factor authentication method which is not stored in any electronic device. Multi-factor authentication is a means of authenticating with more than one form; combining factors of authentication greatly reduces the chance of a failure in the authentication process. The ...

Pythonista 3 iOS Hacking
By: CybrarySupport
December 2, 2016

Many iOS users would agree that Apple products are very restricting and limit the max functionality of the device itself. There are only a few ways to unleash the potential iOS devices have when it comes to hacking. Some people resort to Jailbreak which can make the device vulnerable to attacks. But for all the programmers out there, there ...

Why are Russians Such Talented and Determined Hackers?
By: rcubed
December 1, 2016

When we hear about cybercrime and hacking exploits we tend to immediately assign blame to the usual suspects: the Russians or the Chinese. Next in line are hackers from other Eastern European countries formerly part of the Soviet Union such as Romania and other satellites. Increasingly, cyber "bad guys" from Russia are hogging most of the press ...

Password Generation Principles
By: Cernyr
December 1, 2016

Hello, fellow Cybrarians!Today I would like to introduce you to the fine art of password creation. In the first part of this article, we will discuss the anatomy of a password, and the definition of entropy. In the second part, we will look at some real life examples of easy to generate but hard to guess passwords. So without ...

MobSF: World's Most Powerful Mobile Pentesting Framework
By: bachan
December 1, 2016

Hello Cybrarians,The world is changing & technology is becoming more and more advanced. Everything is mobile.So let's start! For the most advanced mobile pentesting environment:  Mobile Security Framework (MobSF) It is an automated pentesting framework created by Ajin Abraham.You can clone the latest release from github  https://github.com/ajinabraham/Mobile-Security-Framework-MobSF.git It is an automated mobile (android/iOS) pentesting framework which is capable of performing a static ...

Risk Management Disaster Planning
By: prabesh8583
December 1, 2016

Risk Management: Contingency Planning - "Plan B" What? Today I want to share about so called the Plan B, it comes under risk management. Big or small every organization should have contingency planning. Contingency planning refers to the planning for unexpected events when the use of technology is disrupted and business operation ...

Demystifying Modern Sorcery (Coding)
By: RedRum69
November 30, 2016

Coding (or programming/black magic) is one of those things everyone talks about, acknowledges that everyone needs to know something about, but barely anyone actually does. Coders have this weirdly conflicting aura; they are the kingmakers, modern day sorcerers who, with seemingly an incomprehensible wave of the hand, can conjure a piece of software out of thin air, and in many ...

Palm Reading: How Hackers Steal Data from the Palm of your Hand Via Mobile Applications
By: Olivia
November 29, 2016

Today, I’m a psychic.And my prediction for the upcoming year is this: Mobile applications will become hacker’s target of choice.According to Dr. Larry Ponemon, Chairman and Founder of the Ponemon Institute, a research think tank dedicated to advancing privacy and data protection practices, “The average organization tests fewer than half of the mobile applications it builds, and 33 percent of ...

Big Mac Attack: Is the Apple Macintosh Virus-Proof?
By: rcubed
November 29, 2016

The age-old battle of supremacy between PC and Mac users dates back to the introduction of the first Mac back in 1984. I jumped on the Apple bandwagon back then with a purchase of the original Mac 128k machine. I loved it and the MS DOS machines I was using at work couldn’t hold a candle to ...