Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

December 11, 2015
By: usman47
3835

3 Tips for Working with Complex Passwords
  Introduction When creating strong passwords, it’s often recommended to make them 8 – 10 characters long with lower case, upper case and numeric values and sometimes special characters. This is really good, but when it comes to remembering these letter-number combinations, it can be like solving a complicated mathematical equation and remembering the answer. Sometimes, we try to play it smart and use a password generator. These tools create nice, strong pa ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 11, 2015
11772

By: usman47
Hacking is vast field. It involves a lot of learning , patience and practice. Everyone here wants to become a L33T H@cker, but how? That’s a multi-million dollar question and everyone’s been asking about it. So, I’ll give you guys some info about How To Become A Hacker (an Ethical Hacker, specifically). Let’s get start ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 10, 2015
3249

By: rotsap
Passwords are victims of neglect and the weakest links in the IT landscape   Security savvy starts here Carefully creating and handling passwords is the perfect place to become a more savvy Security Pro. It seems reasonable that by the time someone launches their security career, they’d be practicing safe password usage and deployme ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 9, 2015
By: Amrit Chhetri
5779

CASE STUDY: Website Phishing Attack
1. Case Summary: Mrs. Poornima Rai, working as a Social Media Strategist a firm called ‘Next Gen Digital System,’ received an email with promotional offer attached to it. She’s an intelligent person who always loved listening to music and dating books with coffee. She also has some knowledge about attacks through emails and their effect. Mrs. Pinky Sharma, CEO of’ ‘Next Gen Digital System’ called up Mr. Amar Chhetri, a certified Computer Foren ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 7, 2015
By: Daelphinux
5327

Shatter this Myth: Passwords Keep Your Data Totally Safe
“Door locks keep the good people out. The bad guys will break a window.”   For the life of me, I can’t remember where I heard that quote, but it’s an important one to remember when approaching cyber security problems. Most “preventative” security measures (the kinds of things that make us feel safe) are not as effective as people think. Many efforts lull users into a false sense of security, which may be the single most dangerous pla ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 3, 2015
7895

By: JoshBellamy
With U.S.-supplied, highly enriched uranium Iran was able to fuel a small nuclear reactor, effectively beginning their nuclear program in the 1960’s.  Though advancement of the nuclear program slowed during the Islamic revolution and Iran-Iraq war, by the middle of the 1990’s, Iran publicly pursued continuation of their nuclear program. ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 3, 2015
23553

By: usman47
If you’ve read my older articles 7 Steps to Create a Defensive Security Shield for MS Windows and Ethical Hacking: How To Use Batch Programming then you might have noticed one thing: getting hacked on a Windows machine is so damn easy. I thought that I should give you guys some info on how to hunt down malware in your computer. As alway ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 30, 2015
By: Daelphinux
8664

3 Social Engineering Scenarios You Should Know
Social Engineering is one of the most terrifying aspects of trying to secure anything in any way. Unfortunately, most people lack the ability to understand they’re being engineered and act on that realization.   Social engineering attacks rely on common tropes, which can easily be learned if you understand: when compassion is necessary how to pay attention to questions how to recognize when you’re being encouraged to “fill in the blank” the need to loo ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel