What is Computer Exploit? Tips to Keep You Safe in 2019

A computer exploit usually refers to vulnerability on software through which hackers can gain access to data. Usually, users are not even aware that such vulnerabilities exist and this puts them in a very precarious position. The problem is generally fixed by the developers, and they avail the safer software through updates. It is therefore incumbent upon the user to …

What is Identity Theft? How to Protect Yourself in 2019

Identity theft is one of the most downplayed yet incredibly risky threats to your data security. As can be inferred from the name, it involves  impersonation. Usually the hacker or criminal will gain your personal data and use it for their own financial gain. They can use your passwords to gain access to your accounts,  and then proceed to make …

What is Spoofing? How to Mitigate Under the Radar Threats

Spoofing refers to impersonation by a hacker of another website or device on a network. They will often pick a device or website that you trust, which means that you are more likely to divulge sensitive information without raising an eyebrow. Usually, spoofing involves emails, IPs and DNS.

The only way to spot spoofing is by being very keen. If …

Several Cryptojacking Apps Found on Microsoft Store

Among the latest discoveries of the Symantec are the eight apps on the Microsoft that have been really found to have the capacity to mine the Monero even without the user’s authority or knowledge! The potentially unwanted applications commonly known as the PUAS was discovered on the 17th date of January. These potentially unwanted applications are actually contained in the …

Build a Blockchain PoC Application using Hyperledger Fabric

This piece of experience written by Don li in creating a blockchain PoC application for land and title recording on blockchain leveraging Hyperledger Fabric (HF) blockchain platform. It may benefit those who just got started on HF or intend to learn it and for those who are already experienced in HF it may offer another equally viable option.

See what …

How to get HTTPS working on your local development environment in less then 10 minutes

This information shared by Daksh on Medium about the https installation on local development environment.

See what he is saying:

[“   Almost any website you visit today is protected by HTTPS. If yours isn’t yet, it should be. Securing your server with HTTPS also means that you can’t send requests to this server from one that isn’t protected by …