Cybrary Pro Day is here!

0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

How To Open an OST File In MS Outlook 2016
By: jamiekaler
June 11, 2018

An OST file is an important necessity when working with an MS® Exchange mailbox account, as it helps to provide a replica of the Exchange server account. The OST file is highly helpful in difficult scenarios when there is server downtime or some Exchange crash, or when Exchange is not available because of scheduled tasks. In such ...

How to Convert EML Files to PST File Format
By: imstefanie90
June 11, 2018

EML files are the most commonly known file format across the world. More then 30+ email clients use .eml files to store their emails/messages. EML is a plain text file that contains the header, body, and footer. EML Header - contains an email address, subject, from, to, cc, bcc, time, date, ...

Are Your Home Security Cameras Safe?
By: Jessica
June 10, 2018

You need to have eyes everywhere. With the countless sources of danger that exist everywhere from the grocery store to the park, you have to constantly remain alert and watchful. This is especially true for many when it comes to their homes, the personal sanctuaries they share with family and loved ones. Homes are major financial and emotional investments, ...

Which Image File Format Should I Use, and When Should I Use It?
By: Jessica
June 10, 2018

Whether you’re a website developer or an everyday person who occasionally uploads and shares pictures or makes scrapbook graphics, at some point, you’ve been presented with the task of having to save an image in some type of file format of your choosing. The issue is that many people, even some of the tech-savvy, have no idea which file ...

5 Best Development Practices for the Security of Mobile Banking Apps
By: Dr. Michael J. Garbade
June 10, 2018

The current trend to “mobilize” banking services is phenomenal, with several leading banks and other financial institutions embracing this wonderful technology to reduce costs, improve customer outreach, and gain a competitive edge. However, most mobile banking apps are susceptible to hacking. For example, a study by the University ...

How to Fix Outlook Error 0X800401d
By: devinsmith
June 10, 2018

Have you ever encountered the Outlook error message “An unknown error occurred, error code: 0X800401d”? Here in this blog, we are going to discuss how you can easily fix this Outlook error: 0X800401d. MS Outlook is the most popular email client for e-communication within organizations. The PST files are created automatically by Microsoft ...

DLP Regulatory Compliance: What Makes It Different From Simple Cloud DLP?
By: Ugra Narayan Pandey
June 9, 2018

To establish your stand in an IT field, it is now mandatory to use cloud computing techniques. It is so because this technology is considered to be the latest, trending, and modern way of doing business. There is no disadvantage of using this new technology, but the only thing that needs to be focused on is ...

PATCHING HUMAN STUPIDITY 101 - "Analysing Phishing Email"
By: strainer
June 9, 2018

Synopsis " The human is the weakest link in the cybersecurity chain. " If you don't know about this "gossip" yet, well, it's a fact.When we hear about phishing, our normal response is to be careful about clicking links from email content that direct us to malicious websites on the Internet, yet we tend ...

Office 365 Updates to Enhance Productivity and Security
By: seoweb2writer
June 8, 2018

With cloud services becoming increasingly popular among businesses, service providers are investing heavily in developing sophisticated tools that facilitate greater collaboration between employees, clients, etc. for increased productivity. The new and improved versions not only help increase productivity but also ensure the security of personal information and the data of clients and customers. ...

Understanding and Handling Ransomware
By: michaelwarne
June 8, 2018

Ransomware is a type of cyberattack wherein malicious software takes control of a system and prohibits the user from accessing that system. The attacker usually encrypts a system to make it inaccessible and then demands a ransom from the user for resuming the services, which may or may not happen once the ransom is paid. The ...