Networking

How to Do Test Network and Deploy Chaincode

The test network is provided for learning about Fabric by running nodes on your local machine. Chaincode is a piece of code that is written in one of the supported languages such as Go or Java. $cd fabric-samples/test-network $./network.sh down //Turn off historical network $./network.sh up //Start a new network After the start up, next step is to …

How to Do Test Network and Deploy Chaincode Read More »

Spear Phishing

Spear phishing is an email or electronic communications scam targeted towards a specific victim, and messages are modified to specifically address that victim. Spear phishers require more thought and time to achieve than phishing attacks. Attackers try to obtain as much personal information about their victims as possible to make emails look legitimate. Take these …

Spear Phishing Read More »

Social Media Cybersecurity Risks

Social media are often the cause of unintentional data leakage. To avoid these problems, only install a trusted application. Providing Too Much Personal Information Avoid sharing personal information online. It can put your personal information at risk. Don’t overshare on social media, those are enough for most identity thieves to break into your accounts or …

Social Media Cybersecurity Risks Read More »

Top 10 Most Common Cybercrimes by Offense

Cybercrime is an illegal or criminal activity that uses computer or any networked device. There is a lot of illegal activities such as fraud, trafficking child pornography, stealing identity, cyberbullying, and online scam. The Top 10 Most Common Cybercrimes by Offense reported according to PNP Anti Cybercrime Group. Online Scam Online Libel Computer-related Identity Theft …

Top 10 Most Common Cybercrimes by Offense Read More »