0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

5 Simple Ways to Prepare for IT/Cybersecurity Interviews
By: ginasilvertree
January 28, 2019

Interviews can be complex – from the scheduling the meeting or call to the actual meeting to the follow-up. Candidates, recruiters, and hiring managers all play key roles in this somewhat difficult-to-navigate process. As a candidate, your role entails several elements, not the least of which is preparation.The Scouts (formerly known as the Boy Scouts), which was founded in ...

28th January – Data Protection Day
By: bulek
January 28, 2019

What is Data Protection Day? In 2007 the Council of Europe held the first “Data Protection Day”, known as “Data Privacy Day” outside of Europe, to increase awareness about rights to personal data protection and rights. In 2009 The USA joined this drive by declaring the ...

7 Online Privacy Tips to Re-Take Control of Your Data [in 2019]
By: CyberX
January 28, 2019

Do you read about recent data scandals and cringe at the thought of how your personal data is being treated? Or do you feel that you should have at least some control over your data?You’re not alone.Many people are beginning to realize that social media and the internet have helped our society advance at unprecedented rates.But:They ...

Agave – A complete suite of tools for Incident Response
By: andresBello
January 25, 2019

Hello, Cybrary community!It has been a lot of time after my latest article about Tequila, a forensic distribution whose profile is presented as the first OS distribution focused on forensics in the Latam territory.Part of the project is also an additional suite of tools targeted to perform Incident Response over Windows environments called Agave. I promised in my ...

From Noob to Exploit Developer | My Journey
By: y.kashyap007
January 24, 2019

I'm sharing my cybersecurity journey till now with you guys. To tell you a bit about myself, I'm a B.Tech undergraduate in Computer Science and of course a Cyber Security enthusiast. 'Hacking' is the single most important thing that attracts me, besides football. I was the best programmer back in my school. I knew then that all I wanted was ...

Website Security with SSL
By: walt.hutsky
January 24, 2019

If you look at the address bar in your browser you’ll see that my website is now showing Secure, with a green lock symbol, and that the address starts with https . This means that SSL website encryption is enabled and working. What is SSL? Secure Sockets Layer is a standard security protocol that is used to encrypt ...

i2p Networks, Tor and Freenet Features: Pros + Cons
By: Dra4hos7
January 23, 2019

I2p topology i2p is the so-called overlay network. Translated from English “overlay” – overlay or layering. In this case, there is a view of the layering over the already existing Internet, so i2p is sometimes also called the “network over the network”. All traffic on this network is completely isolated and encrypted, thereby ensuring the anonymity of data ...

Data Privacy Day 2019: How to Stay #PrivacyAware
By: Tatianna
January 23, 2019

You know all about privacy settings; from personal settings on your social media accounts to how to keep your passwords (you know, the ones you've written down and stuck to the bottom of your keyboard) hidden. But do you know the importance of data privacy, or what it entails? Data Privacy As part of the National Cyber ...

Securing Critical Data with Traditional Media
By: Guest Writer
January 23, 2019

Advancements in information technology have greatly accelerated the pace of communications and by extension, the way people interact with each other. Outside of the digital divide, virtually anyone can be reached through some system of digital communication . ...

DNS Rebinding – Behind The Enemy Lines
By: Dra4hos7
January 19, 2019

Introduction DNS Rebinding is a technique or situation in which attacker relies on the gap between SOP and DNS to achieve access to otherwise restricted areas or services ( local network, another website, etc.). Here we’re going to try and explain DNS Rebinding with a short example. DNS Rebinding With DNS rebinding a remote attacker can ...