Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

July 9, 2015
By: DocGreenBanner
2998

Don’t Be the Victim of Cyber Fraud
As a volunteer with a cyber crime-non profit, I’ve recently worked a case involving fraud. I’d like to share the following techniques to avoid fraud from electronic media, such as social media and email. And, the same information can also apply to in-person, phone or mail solicitations.   First of all, if it sounds too good to be true, it very likely is too good to be true. There are no contests or lotteries that someone else entered you in. If they did ente ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 8, 2015
3038

By: Multi Thinker
1. Testing and confirming Xpathi Testing for Xpath and confirming are the most important parts. Most of us, and specially the readers of securityidiots, see SQLi everywhere and anywhere they find an error – even if the error is a Conversional Error, Internal Error or Programming Error. Sometimes, people assume that getting blocked by WA ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 8, 2015
2651

By: Multi Thinker
The XML Example Document We’ll use the following XML document in the examples below. <?xml version="1.0" encoding="UTF-8"?> <bookstore> <book> <title lang="eng">Harry Potter</title> <price>76.99</price> </book> <book> <title lang="eng ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 7, 2015
By: ^Graff
38395

Evil Twin Attack Using Kali Linux
Evil Twin Attack using Kali Linux By Matthew Cranford I searched through many guides, and none of them really gave good description of how to do this. There’s a lot of software out there (such as SEToolkit, which can automate this for you), but I decided to write my own. The scope of this guide is NOT to perform any MITM attacks or sniff traffic. I have references below for those things, this guide is just to set up the Evil Twin for those attacks. Section 1 – I ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 7, 2015
By: rubins
6135

Recommended: Strong Passwords Technique
I hope this helps others; I find this helpful and useful for my accounts. My technique of using strong and different passwords for any accounts is done through the use of the message digest or hash value. The calculated hash value of a certain word or file is what I used as my password. A strong password must include the following: small letters capital letters numbers special characters the maximum number of characters required if possible, or longer   Some basic inf ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 3, 2015
4973

By: Er. Ragini
Hi Team, Here’s something interesting about Android phone security. You can protect your phone as well safely store information inside the phone. It’s possible this information won’t be new for all, but trust me, if you don’t know this, it could be very beneficial. If your phone has been lost or stolen, you can: Lock ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 3, 2015
15814

By: Alan Raff
Recently in my internship, I was posed with a significant problem. One of the PCs at the company where I work was hit with a new kind of malware that got past all of our threat detection software. A user complained that our threat detection software was blocking every application like IE and Word, which the individual needed to complete their ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 3, 2015
By: fr4nc1stein
4766

Social Engineering Overview | Mind Attacks
Social Engineering Overview | Mind Attacks What is social engineering? According to Wiki: “In the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional “con” in that it is often one of many steps in a more complex fraud scheme.”   Accor ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel