0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Diving a little deeper Previously, I've written about the value of cyber security degrees and wanted to dive a little deeper into this topic. Lately, I have had a series of conversations on this topic. The opinion I've formed on the subject seems to represent a large consensus.Many jobs in cyber security require people to have a certification. ...


Recently in the news, there have been many reports that say that the FBI is fighting Apple. FBI stated that they want Apple to create a backdoor for Apple devices to catch terrorists. The FBI even pressured Apple, but they responded with a public letter stating that they will not create the backdoor and there is a good reason why...security. ...


Here's quick way check the encryption of your WiFi connections: 1 - Open your terminal in Linux and run the following command: Find the ID for your wireless adapter, run ifconfig, scroll down until you see WLAN followed by number. Most of the time it would be wlan0 2 - After ...


As most of you know, social engineering can be exceptionally powerful. In all cases, a social engineering assault is only as good as the engineer. Every fruitful hack - technical or socially engineered - must have been supported by reconnaissance. This kind of reconnaissance we're discussing here isn't recon of a machine, but of the victim. Recon for social engineering ...


The process to comply with HIPAA might seem overwhelming. Keep in mind that most organizations do not become compliant overnight. It's a process that takes time and effort. Each step you take and each safeguard you implement brings you one step closer to compliance. Here are 7 crucial points on HIPAA security: 1. HIPAA is not optional - ...
![[PODCAST] Episode 21 The 2015 Wrap Up](https://images.ctfassets.net/kvf8rpi09wgk/3tpSXLMbs6D0bXlTw8UucK/2d648c6dd1981c3fca93f5c03ea36bc7/blog-default.jpg?w=800&fm=webp)

Hey hey everyone after a very long break due to work, education, and family circumstances we are finally back. On this weeks episode we are joined by Ben Miller and Jayson Street. We discuss three stories from 2015 and talk about our predicitons for 2016. Dont worry we have another episode right around the corner. You can listen to the newest ...


Data Security: Simple Steps to Block USB Ports Needless to say, the most common method for data leakage is through USB/Pen drive/Mass storage devices. Leakage is also high through PCs/laptops that get infected by viruses/malware.Most corporations have centralized control for usage of such devices. However, such controls are desirable in the offices ...


Well, welcome to Part 2 of CHFI and DIGITAL FORENSICS - AutoSpy Case and MD5 Calculator For the Video Demo/Lab for this part, please click here : https://www.youtube.com/watch?v=jO5WVh1q4 What will we cover in this part? - Calculating/Comparing MD5 Hash of files, disks and folders with the MD5 hash calculator- Creating Cases with the AutoSpy ...


As anyone who's into the field of cyber security knows, there are many applications of these skills. Some people use them for their careers, others use it for self gain, and there are others, called hacktivists, that use the skills to do what they believe is benefiting society. There are many hacktivist movements, a large one being Anonymous, and ...


It's been made public by Google researchers that there's a severe bug in GlibC library (A GNU C Library). This is the most fundamental library used by almost every application and almost every Linux-based distribution.Many routers and other hardware devices that used this library could be exploited. Also, programming languages such as Python, PHP and Ruby are affected.The bug ...