Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

July 29, 2018
By: Terumo
6619

Re-Thinking Information Security: The Value of Information
If someone you don’t know approached you on the street and asked for your address, social security number, or ID number, would you give it? Since we consider it “personal” and a “huge violation of our privacy,” you probably wouldn’t, but since we don’t think our email has the same value as a social security number or ID number, you would probably give your email address easily (in person, business cards, chats, surveys, forms, etc.). This happens everyda ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 28, 2018
3672

By: bjacharya
A warm welcome to Lesson 2 of this Cryptocurrency mini-series. I hope that you’ve already seen my OP3N content of Lesson 1 on Cryptocurrency here. In lesson 1, there were some basics on Blockchain already mentioned. So, read that first. Now, let’s move with new content. In this lesson, I will introduce you to some basics of Blockch ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 28, 2018
5212

By: dks11
Introduction Malware continues to be an issue with today’s ever-evolving technology.  It plagues everyone, from new users to advanced users; everyone can be affected by malware. The name comes from the words “malicious” and “software,” hence malware.  Many different forms of malware exist and target many differe ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 27, 2018
By: dnieves
5266

Hacking User Accounts Without Programs in Win10 Home
Welcome to hacking Windows 10 Home profiles! This walkthrough only applies to Win10 Home without any encryption software. Encryption software like Bitlocker or Bitcrypt will block this capability. Win10 Pro Edition without encryption software or on a domain may work, but it hasn’t been attempted yet. These issues don’t come up often, but when they do, we can get frustrated. If you don’t have software like UUkeys, this may be a little tedious to figure out. T ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 25, 2018
By: Dr. Michael J. Garbade
6390

A Brief History of Mobile Malware and How to Protect Your Apps
The digital space has, in recent times, experienced an increase in the number of threats that have led to fraudulent activities. Scammers and hackers usually prey on gullible individuals, swindling them of their hard-earned money as they make vendor payments or online investments. Sunil Kumar, who is an experienced cybersecurity analyst and currently teaches how to perform penetration testing on Android, says that “when people use their mobile devices to carry out transacti ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 24, 2018
4222

By: Sean Mancini
Linux and Unix utilize runlevels to enable certain functionalities from single user mode to GUI mode. These runlevels cater to different needs for system administrators and for troubleshooting. You can set a default runlevel to, say, boot the CLI instead of the GUI. On servers, you generally would use Runlevel 3, which is the multi-user mode t ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 23, 2018
7779

By: bjacharya
Hello and Namaste, Cybrarians. I am back with a new, exciting course series: Cryptocurrency. This is the first lesson of our course, and here, we are covering the following: Cryptocurrency Introduction Bitcoin Introduction  Blockchain Basics Cryptocurrency Let’s begin. If you are reading this, then I ssume that you have some understan ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 22, 2018
By: RonW123
10502

Breaking Into Security Careers 2018
Cybersecurity continues to be a hot career field with many job opportunities. This means more and more folks want to break into it. A common question I’m asked is, “How do I get a job in information security/cybersecurity?”  We continue seeing people who are interested, but they don’t know the steps it takes to start or extend a cyber career.  This blog post answers the question, “How do I break into (the) security (career field)?” It’s updated from my 2014 ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel