0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Spoofing: RFID and SMS
By: Tatianna
November 5, 2018

Spoofing, in Simple Terms First, let's start with a definition - What is Spoofing? According to ForcePoint , "Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails , phone calls, and websites, or can be more technical, such as a computer ...

Task Automations on MacOS - AppleScript
By: Guest Writer
November 3, 2018

AppleScript (AS) is not a name frequently used in cybersecurity. This specific language is based on JavaScript and is used exclusively for automation tasks within the Mac OS. AppleScript can be used to move and click a mouse, enter text, resize windows, change volume levels, and generally carry out any input function the user does. The power of ...

New to Cybrary: Ken Underhill, Master Instructor
By: Tatianna
November 1, 2018

New to Cybrary: Ken Underhill, Master Instructor One of the newest members to the Cybrary team is Ken Underhill, CEH, CHFI . You may have already seen his new Ethical Hacking course which launched a few weeks ago, but we want to introduce you to the SME behind the course.  The Master at Work As ...

MCSA or Network+ — Which Offers the Biggest Benefit?
By: Tatianna
October 30, 2018

MCSA or Network+ is on the list of the most asked questions in Cybersecurity. Depending on the path you choose, or job you're interested in, the answer of which offers the best benefits might surprise you. Let's dig in, shall we? The IT job market is heating up. As noted by Bloomberg , demand for IT professionals such as ...

Cyber Security Hardware Tools
By: Tatianna
October 27, 2018

When learning about modern cybersecurity tools and techniques there is often an emphasis placed on software tools and programs used to gather information, compromise devices, and gain access to restricted features and functions. However, there exists a very wide variety of hardware devices for cyber security, and as of recent, these hardware solutions have been regaining ...

Outlook Internal Error Message?
By: kumarsandeep43
October 24, 2018

MS Outlook Shows Error Message Internal Error Code= 0000000E MS Outlook has two types of data files OST and PST. While PST is stored online on server the OST or (Offline Storage Table) is stored on the local computer which is a replica of PST. Both are important for smooth functioning of MS Outlook. Problem in OST ...

Certification Showdown: MCSA vs CCNA
By: Tatianna
October 24, 2018

Certification Showdown: MCSA vs CCNA, Who Wins? IT budgets are on the rise as companies look to bolster technology teams and drive business outcomes. As noted by ZDNet , predicted budgets for 2019 are on-track for 10 percent increases over this year’s spending to help accommodate the need for new resources, hardware, and IT personnel.Along ...

Linux Basics Terminal Commands
By: masjter_ZA
October 23, 2018

"Terminal commands" Terminal commands: Command Line Interface What is a command? A command is a software program that when executed on the CLI (command line interface) in the terminal, performs an action on the computer. When you type in a command, a process is run by the operating ...

Disinformation is a Cyber Security Threat
By: cynosurekp
October 23, 2018

It's just Fake News... If you are a person who follows news from social media as most people do, you are exposed to a daily dose of Fake News. Fake News, misinformation, junk, deliberately distributed deception and (the newest addition) “fake memes” are various names given to contrived material that is presented to be factually accurate. With ...

Successful Security isn't from Tools - Here's Why!
By: Guest Writer
October 22, 2018

The Opportunity for Successful Security Lies In Automation And Consolidation, Not More Tools In July 2018, Cisco commissioned Forrester Consulting to carry out a study on endpoint and network security strategies. Forrester spoke with 115 IT decision makers, and published the results as a Forrester Opportunity Snapshot titled “Don’t Just Integrate, Automate”.The survey results seem to indicate that ...