0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

What's Fog Computing?
By: kartik571995
July 14, 2016

Hi All!  Today, I’m going to share something about the new Cloud Technology called “The Fog Computing.” Applications such as health-monitoring or emergency response require near-instantaneous response and the delays caused by contacting and receiving data from a cloud data-center can be highly problematic.“Fog Computing” is a response to this challenge. The basic idea is to shift ...

Social Media Risks and Controls
By: infosectdk
July 14, 2016

For many, the use of social media is second nature, but care should always be taken. This is particularly true in the case of the use of corporate Twitter accounts, and how your organization is represented to the outside world. It’s not a case of acceptable use policies (AUP), but more about common sense.This list ...

[podcast] DFIR conference, DFIR policy controls, and a bit of news
By: BrBr
July 14, 2016

 [embed]https://traffic.libsyn.com/brakeingsecurity/2016-027-DFIRpolicycontrols.mp3[/embed]Mr. Boettcher is back!  We talked about his experiences with the#DFIR conference, and we get into a discussion about the gap between when incident response is and when you're using #digital #forensics. Mr. Boettcher and I discuss what is needed to happen before #incident #response is required.We also discuss the Eleanor malware very briefly and I talk about finding Platypus, ...

See How "My Notes" Continues to Grow on Cybrary
By: ginasilvertree
July 13, 2016

Recently, Cybrary released the "My Notes" feature, which members use to their personal record notes while take free cyber security training class . Since its inception, many users have leveraged this tool to capture critical information, thoughts and ideas. Researchers found that if important information was contained in notes, it had a 34 percent chance of being ...

18 Video Tutorials to Prep for the CISA Exam
By: Hemang Doshi
July 13, 2016

CISA Exam - Video Tutorials Steps of Risk Assessment: In this video, we'll learn the steps to follow while conducting risk assessment. This is very important concept from the CISA exam point. You can expect a minimum 5 to 7 questions on the exam on this concept. The Question, Answer and ...

SIEM is Security Systems' "BIG BOSS"
By: Arshad Abid
July 13, 2016

SIEM is like the choirmaster of all your security devices. Other systems only perform/provide the following: Intrusion detection system (IDS) only understand Protocols,Packets & IP addresses. Asset management systems check apps, owners and business processes. Service logs show configuration changes, logins and service activities. Endpoint security takes ...

Google Hall Of Fame – Bug OR Mechanism
By: S-Connect
July 12, 2016

Google Hall of Fame is becoming very popular among security researchers and bug hunters nowadays. Curiosity is at an extreme level; a few of them are calling it ‘Google Hall of Shame’ without analyzing the problem or reason behind the mechanism. A few said ‘we didn't report anything nor did we find a valid security bug, but still our ...

Hide Your IP Using the Zenmate Chrome Extension
By: Ahmed Elessawy
July 12, 2016

An IP (Internet Protocol) address allows your computer to connect with others over the internet. The IP address allows the web to find your device amongst the billions of others connected to it.Of course, this also means that attackers can track what you’re doing online. If someone can see your IP address, they can watch and log your internet activity ...

Browser Plug-Ins and Extensions for Pentesters/Security Analysts
By: MaskedFrog
July 11, 2016

Sometimes, it's necessary to probe a server or network without the resources at hand to load bloated proxies or web testing frameworks. Here's where browser plug-ins and extensions shine.This short list of plug-ins/extensions is not exhaustive. There are hundreds, if not thousands, of plug-ins and Extensions available with dozens and dozens of them intended for pentesting purposes. They can ...

Android Secret Codes Every H@ck3r Should Know
By: Genius
July 11, 2016

#1234# (View SW Version PDA, CSC, MODEM) #12580369# (SW & HW Info) #197328640# (Service Mode) #0228# (ADC Reading) #32489# (Ciphering Info) #232337# (Bluetooth Address) #232331# (Bluetooth Test Mode) #232338# (WLAN MAC Address) #232339# (WLAN Test Mode) #0842# (Vibra Motor Test Mode) #0782# (Real Time Clock Test) ...