0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Cyber Security Degrees Remain Critical, Though Certs Drive the Industry
By: ryan c
March 3, 2016

Diving a little deeper Previously, I've written about the value of cyber security degrees and wanted to dive a little deeper into this topic. Lately, I have had a series of conversations on this topic. The opinion I've formed on the subject seems to represent a large consensus.Many jobs in cyber security require people to have a certification. ...

Apple's Battle for Privacy
By: Rattar
March 3, 2016

Recently in the news, there have been many reports that say that the FBI is fighting Apple. FBI stated that they want Apple to create a backdoor for Apple devices to catch terrorists. The FBI even pressured Apple, but they responded with a public letter stating that they will not create the backdoor and there is a good reason why...security. ...

A Quick Way to Check Encryption on WiFi Connections
By: Stickman
March 2, 2016

Here's quick way check the encryption of your WiFi connections:   1 - Open your terminal in Linux and run the following command: Find the ID for your wireless adapter, run ifconfig, scroll down until you see WLAN followed by number. Most of the time it would be wlan0 2 - After ...

Psychological Reconnaissance
By: CyberRat
March 2, 2016

As most of you know, social engineering can be exceptionally powerful. In all cases, a social engineering assault is only as good as the engineer. Every fruitful hack - technical or socially engineered - must have been supported by reconnaissance. This kind of reconnaissance we're discussing here isn't recon of a machine, but of the victim. Recon for social engineering ...

7 Critical Points about HIPAA Security
By: kboie
March 2, 2016

The process to comply with HIPAA might seem overwhelming. Keep in mind that most organizations do not become compliant overnight. It's a process that takes time and effort. Each step you take and each safeguard you implement brings you one step closer to compliance. Here are 7 crucial points on HIPAA security:  1. HIPAA is not optional - ...

[PODCAST] Episode 21 The 2015 Wrap Up
By: CyDefe
March 1, 2016

Hey hey everyone after a very long break due to work, education, and family circumstances we are finally back. On this weeks episode we are joined by Ben Miller and Jayson Street. We discuss three stories from 2015 and talk about our predicitons for 2016. Dont worry we have another episode right around the corner. You can listen to the newest ...

Data Security: Simple Steps to Block USB Ports
By: Hemang Doshi
February 29, 2016

Data Security: Simple Steps to Block USB Ports Needless to say, the most common method for data leakage is through USB/Pen drive/Mass storage devices. Leakage is also high through PCs/laptops that get infected by viruses/malware.Most corporations have centralized control for usage of such devices. However, such controls are desirable in the offices ...

Part 2: CHFI and DIGITAL FORENSICS - AutoSpy Case and MD5 Calculator
By: bjacharya
February 29, 2016

Well, welcome to Part 2 of CHFI and DIGITAL FORENSICS - AutoSpy Case and MD5 Calculator For the Video Demo/Lab for this part, please click here : https://www.youtube.com/watch?v=jO5WVh1q4   What will we cover in this part? - Calculating/Comparing MD5 Hash of files, disks and folders with the MD5 hash calculator- Creating Cases with the AutoSpy ...

Anonymous: Who Are They and What Do They Do?
By: Brandon H
February 25, 2016

As anyone who's into the field of cyber security knows, there are many applications of these skills. Some people use them for their careers, others use it for self gain, and there are others, called hacktivists, that use the skills to do what they believe is benefiting society. There are many hacktivist movements, a large one being Anonymous, and ...

GlibC Linux Bug or Why Am I Making a New OS?
By: Rattar
February 25, 2016

It's been made public by Google researchers that there's a severe bug in GlibC library (A GNU C Library). This is the most fundamental library used by almost every application and almost every Linux-based distribution.Many routers and other hardware devices that used this library could be exploited. Also, programming languages such as Python, PHP and Ruby are affected.The bug ...