Hackers can shut down entire networks, tamper with data, lure unwary users into cybertraps, steal and spoof identities, and carry out other devious attacks by leveraging centralized repositories and single points of failure.
http://venturebeat.com/2017/01/22/blockchains-brilliant-approach-to-cybersecurity/
Leave a Comment
You must be logged in to post a comment.