Binance Square
SecurityAlert
39,697 visningar
38 Inlägg
Rekommenderas
Senaste
LIVE
LIVE
SNIKSHI
--
5 Tips to Secure Your Cryptocurrency Holdings Key Takeaways Keep your seed phrase offline to safeguard against digital theft. Be vigilant against spoofed influencer social media accounts by verifying profile authenticity. Avoid accessing your crypto wallet or making transactions over public WiFi. Be cautious of livestream videos promising crypto giveaways. Check the channel's legitimacy and promotion style. Be vigilant against AI-generated deepfake scams by paying attention to inconsistencies in video and audio. As cryptocurrencies increasingly enter the mainstream, concerns about their security have become more pressing. Every year, cybercriminals steal staggering amounts of digital assets. Staying vigilant is key to protecting your cryptocurrency investments in this dynamic environment. This article will outline the top five security best practices to help you shield your digital assets from various threats. How Can I Secure My Cryptocurrency Holdings? To secure your crypto holdings, you must always be vigilant as to what scammers can do and be proactive with your protective measures. Below are some steps you can take to secure your digital assets. 1. Secure Your Seed Phrase Your seed phrase (also known as recovery phrase) is the gateway to your wallet and cryptocurrency holdings. It's a sequence of 12 to 24 words that serves as your wallet master key in case you lose access to your wallet or need to migrate to a new device. Below are some tips on how to secure your seed phrase. Store your seed phrase offline The moment you get your seed phrase, avoid saving it in local folders or cloud storage. Storing the phrase online may expose it to potential hacks. The safest approach is to store them offline. One way to do this is by investing in a hardware wallet that can generate your seed phrase and store it offline. Another option is to back up your seed phrase physically inside a vault or safe. You could use a paper backup, but it’s safer to use a metal plate with the seed phrase engraved. Split your seed phrase If you want to enhance the security of your seed phrase further, you may split it into multiple parts and store them in different secure locations. Keep copies of your seed phrase in various physical places, such as bank vaults, safety deposit boxes, or trusted individuals. Ideally, no one but you should have access to all parts of your seed phrase. 2. Beware of Social Media Account Spoofing Social media platforms have become breeding grounds for cryptocurrency scams, with scammers creating fake accounts that closely mimic well-known exchanges or celebrities. Below is a reminder from the real Vitalik Buterin, warning users about the thousands of fake profiles out there pretending to be him. These malicious parties try to dupe and scam users by mimicking or spoofing well-known accounts. Here are some steps to protect yourself from social media account spoofing. Check for verification signs: Look for blue check marks or verification symbols on profiles. However, be aware that these can be faked or bought.  Check the handle: The handles are usually a giveaway for fake profiles. Savvy scammers will try to keep the names as similar to the original ones as possible. For example, “@Vita1ikButerin” instead of “@VitalikButerin”. Scroll: Scroll through the profile and try to see some historical posts. This should give you an idea about the profile’s authenticity. 3. Avoid public WiFi Public WiFi networks are notorious for lacking security and susceptibility to cyberattacks. Accessing your cryptocurrency wallet or conducting transactions while connected to public WiFi can put your assets at risk. Public WiFi networks are vulnerable to a range of cyber threats, including: Evil twin attacks: Hackers set up malicious hotspots with trustworthy names (e.g., "Guest WiFi Hotel") to intercept your data when you connect. Man-in-the-Middle (MitM) attacks: Malicious actors can intercept data transmitted between a WiFi router and a user's device, potentially accessing sensitive information like login credentials. Password cracking attacks: Scammers use software to attempt numerous username and password combinations to unlock a router's management interface. Avoid using public WiFi networks when accessing cryptocurrency accounts or executing transactions. For more information, please check Why Public WiFi Is Insecure. 4. Watch out for fraudulent livestream videos Scammers have turned to platforms like YouTube and Twitch to spread cryptocurrency fraud. Typically, scammers use stolen video content to run fake livestreams that promote fake giveaways. In some cases, they will use hacked YouTube accounts with millions of followers and try to convince users to join their giveaways by sending some cryptocurrency to specific addresses. For example, you could come across a video of Elon Musk, Cathie Wood, and Jack Dorsey discussing crypto and blockchain technology. However, scammers may use a legit video to promote their fake or stolen channel and a fraudulent giveaway. Make sure you do your due diligence before engaging with any live video, especially those related to cryptocurrency giveaways. In the vast majority of cases, the giveaways will ask you to send money first before receiving anything back. But you will lose your money if you do that. Verify the legitimacy of the channel by considering factors such as the number of videos, the presence of verification badges, and the channel's creation date. But be careful and make sure to check multiple data points because hacked accounts may seem legit at first and even have millions of subscribers. In addition, you can check the official social media accounts of the people involved in the video. If the promotion is legit, you should be able to find some information from multiple reliable sources. 5. Beware of AI Deepfake Scams Deepfake technology uses artificial intelligence (AI) to create fake videos that look real. It combines existing images and videos to make it seem like people are doing or saying things they never did. As you can imagine, scammers have started using deepfake to create highly intricate scams. Hackers use deepfake to pose as someone else or pretend to be experts. Hackers often trick their victims with fake contests or investment opportunities, rushing them with deadlines. So, what can you do to protect yourself from these deepfake scams? Pay attention to the face: At the end of the day, deepfake stitches together numerous images to create the content. Pay attention to blinking patterns and lip-syncs. Inconsistent audio: Robotic-sounding voices or unusual fluctuations may indicate a deepfake. Make sure you are closely listening for any inconsistencies in audio quality. Questions: When interacting with a suspected deepfake, make sure you ask many questions that only the real person will know. Make sure you have some background information to continually cross-reference for validation. Closing Thoughts Protecting your cryptocurrency assets is your responsibility. In this article, we have detailed five best practices to keep your coins safe: Secure your seed phrase. Beware of social media account spoofing. Avoid public WiFi. Be wary of fake livestream videos. Beware of deepfakes. As time progresses, scammers become more sophisticated, devising intricate schemes. At the end of the day, knowledge and vigilance are your strongest allies. Stay informed, stay secure, and protect your digital wealth. Disclaimer: This content is presented to you on an “as is” basis for general information and educational purposes only, without representation or warranty of any kind. It should not be construed as financial, legal or other professional advice, nor is it intended to recommend the purchase of any specific product or service. You should seek your own advice from appropriate professional advisors. Where the article is contributed by a third party contributor, please note that those views expressed belong to the third party contributor, and do not necessarily reflect those of Me. Please read our full disclaimer here for further details. Digital asset prices can be volatile. The value of your investment may go down or up and you may not get back the amount invested. You are solely responsible for your investment decisions. This material should not be construed as financial, legal or other professional advice. ⚠️⚠️⚠️Risk Warning.⚠️⚠️⚠️ $BTC {future}(BTCUSDT) $SOL {future}(SOLUSDT) $BNB {future}(BNBUSDT) #SecureYourGains #SecurityDepositScams #SecurityAlert #SecureYourProfits #SecureInvestments"

5 Tips to Secure Your Cryptocurrency Holdings

Key Takeaways
Keep your seed phrase offline to safeguard against digital theft.
Be vigilant against spoofed influencer social media accounts by verifying profile authenticity.
Avoid accessing your crypto wallet or making transactions over public WiFi.
Be cautious of livestream videos promising crypto giveaways. Check the channel's legitimacy and promotion style.
Be vigilant against AI-generated deepfake scams by paying attention to inconsistencies in video and audio.
As cryptocurrencies increasingly enter the mainstream, concerns about their security have become more pressing. Every year, cybercriminals steal staggering amounts of digital assets. Staying vigilant is key to protecting your cryptocurrency investments in this dynamic environment. This article will outline the top five security best practices to help you shield your digital assets from various threats.

How Can I Secure My Cryptocurrency Holdings?
To secure your crypto holdings, you must always be vigilant as to what scammers can do and be proactive with your protective measures. Below are some steps you can take to secure your digital assets.

1. Secure Your Seed Phrase
Your seed phrase (also known as recovery phrase) is the gateway to your wallet and cryptocurrency holdings. It's a sequence of 12 to 24 words that serves as your wallet master key in case you lose access to your wallet or need to migrate to a new device. Below are some tips on how to secure your seed phrase.
Store your seed phrase offline
The moment you get your seed phrase, avoid saving it in local folders or cloud storage. Storing the phrase online may expose it to potential hacks. The safest approach is to store them offline.
One way to do this is by investing in a hardware wallet that can generate your seed phrase and store it offline. Another option is to back up your seed phrase physically inside a vault or safe. You could use a paper backup, but it’s safer to use a metal plate with the seed phrase engraved.
Split your seed phrase
If you want to enhance the security of your seed phrase further, you may split it into multiple parts and store them in different secure locations. Keep copies of your seed phrase in various physical places, such as bank vaults, safety deposit boxes, or trusted individuals. Ideally, no one but you should have access to all parts of your seed phrase.

2. Beware of Social Media Account Spoofing
Social media platforms have become breeding grounds for cryptocurrency scams, with scammers creating fake accounts that closely mimic well-known exchanges or celebrities. Below is a reminder from the real Vitalik Buterin, warning users about the thousands of fake profiles out there pretending to be him.
These malicious parties try to dupe and scam users by mimicking or spoofing well-known accounts. Here are some steps to protect yourself from social media account spoofing.
Check for verification signs: Look for blue check marks or verification symbols on profiles. However, be aware that these can be faked or bought. 
Check the handle: The handles are usually a giveaway for fake profiles. Savvy scammers will try to keep the names as similar to the original ones as possible. For example, “@Vita1ikButerin” instead of “@VitalikButerin”.
Scroll: Scroll through the profile and try to see some historical posts. This should give you an idea about the profile’s authenticity.

3. Avoid public WiFi
Public WiFi networks are notorious for lacking security and susceptibility to cyberattacks. Accessing your cryptocurrency wallet or conducting transactions while connected to public WiFi can put your assets at risk.
Public WiFi networks are vulnerable to a range of cyber threats, including:
Evil twin attacks: Hackers set up malicious hotspots with trustworthy names (e.g., "Guest WiFi Hotel") to intercept your data when you connect.
Man-in-the-Middle (MitM) attacks: Malicious actors can intercept data transmitted between a WiFi router and a user's device, potentially accessing sensitive information like login credentials.
Password cracking attacks: Scammers use software to attempt numerous username and password combinations to unlock a router's management interface.
Avoid using public WiFi networks when accessing cryptocurrency accounts or executing transactions. For more information, please check Why Public WiFi Is Insecure.

4. Watch out for fraudulent livestream videos
Scammers have turned to platforms like YouTube and Twitch to spread cryptocurrency fraud. Typically, scammers use stolen video content to run fake livestreams that promote fake giveaways. In some cases, they will use hacked YouTube accounts with millions of followers and try to convince users to join their giveaways by sending some cryptocurrency to specific addresses.
For example, you could come across a video of Elon Musk, Cathie Wood, and Jack Dorsey discussing crypto and blockchain technology. However, scammers may use a legit video to promote their fake or stolen channel and a fraudulent giveaway.
Make sure you do your due diligence before engaging with any live video, especially those related to cryptocurrency giveaways. In the vast majority of cases, the giveaways will ask you to send money first before receiving anything back. But you will lose your money if you do that.
Verify the legitimacy of the channel by considering factors such as the number of videos, the presence of verification badges, and the channel's creation date. But be careful and make sure to check multiple data points because hacked accounts may seem legit at first and even have millions of subscribers.
In addition, you can check the official social media accounts of the people involved in the video. If the promotion is legit, you should be able to find some information from multiple reliable sources.

5. Beware of AI Deepfake Scams
Deepfake technology uses artificial intelligence (AI) to create fake videos that look real. It combines existing images and videos to make it seem like people are doing or saying things they never did. As you can imagine, scammers have started using deepfake to create highly intricate scams.
Hackers use deepfake to pose as someone else or pretend to be experts. Hackers often trick their victims with fake contests or investment opportunities, rushing them with deadlines.
So, what can you do to protect yourself from these deepfake scams?
Pay attention to the face: At the end of the day, deepfake stitches together numerous images to create the content. Pay attention to blinking patterns and lip-syncs.
Inconsistent audio: Robotic-sounding voices or unusual fluctuations may indicate a deepfake. Make sure you are closely listening for any inconsistencies in audio quality.

Questions: When interacting with a suspected deepfake, make sure you ask many questions that only the real person will know. Make sure you have some background information to continually cross-reference for validation.
Closing Thoughts
Protecting your cryptocurrency assets is your responsibility. In this article, we have detailed five best practices to keep your coins safe:
Secure your seed phrase.
Beware of social media account spoofing.
Avoid public WiFi.
Be wary of fake livestream videos.
Beware of deepfakes.
As time progresses, scammers become more sophisticated, devising intricate schemes. At the end of the day, knowledge and vigilance are your strongest allies. Stay informed, stay secure, and protect your digital wealth.

Disclaimer: This content is presented to you on an “as is” basis for general information and educational purposes only, without representation or warranty of any kind. It should not be construed as financial, legal or other professional advice, nor is it intended to recommend the purchase of any specific product or service. You should seek your own advice from appropriate professional advisors. Where the article is contributed by a third party contributor, please note that those views expressed belong to the third party contributor, and do not necessarily reflect those of Me. Please read our full disclaimer here for further details. Digital asset prices can be volatile. The value of your investment may go down or up and you may not get back the amount invested. You are solely responsible for your investment decisions. This material should not be construed as financial, legal or other professional advice.
⚠️⚠️⚠️Risk Warning.⚠️⚠️⚠️
$BTC
$SOL
$BNB
#SecureYourGains #SecurityDepositScams #SecurityAlert #SecureYourProfits #SecureInvestments"
🚨 Beware of Fraudulent Activity: Fake AEVO Tokens Circulating! 🚨 Attention all Binance users! We've received reports of scammers attempting to sell counterfeit AEVO tokens. These tokens have not been issued by Binance and pose a significant risk to your investments. Scammers may coerce you into transferring funds via Web3 wallets. We urge you to remain vigilant and safeguard your earnings from these deceitful schemes. Your hard-earned income deserves protection! Stay safe and trade wisely, Binance community! Your security is our top priority. 🛡️ #Binance #SecurityAlert #StaySafe #Write2Earn
🚨 Beware of Fraudulent Activity: Fake AEVO Tokens Circulating! 🚨

Attention all Binance users! We've received reports of scammers attempting to sell counterfeit AEVO tokens. These tokens have not been issued by Binance and pose a significant risk to your investments.

Scammers may coerce you into transferring funds via Web3 wallets. We urge you to remain vigilant and safeguard your earnings from these deceitful schemes. Your hard-earned income deserves protection!

Stay safe and trade wisely, Binance community! Your security is our top priority. 🛡️ #Binance #SecurityAlert #StaySafe #Write2Earn
Urgent Warning for Ledger Users: Security Breach in Ledger Connect-KitIn a recent development, a security breach has been identified in the Ledger Connect-Kit, posing a potential risk to user data. We strongly advise all Ledger users to exercise caution and avoid connecting their devices to any decentralized applications (#dApps) until further notice.Incident Overview: Reports from reliable sources indicate a security compromise within the Ledger Connect-Kit, raising concerns about the safety of user information. The extent of the breach is under investigation by relevant authorities and security experts.Official Statements: While awaiting official updates, it is crucial for Ledger users to prioritize their safety. To stay informed, follow the latest developments on the situation through official channels and statements.Sources: For detailed insights into the security breach and ongoing investigations, refer to the following tweets:SolidProof_io TweetBlockaid_ TweetUser Safety Measures: As a precautionary measure, refrain from connecting your Ledger device to any #dApps until investigations are completed and official sources confirm the safety of the Ledger Connect-Kit.Stay Informed, Stay Safe: Your safety is our top priority. Please share this information within the Ledger community to ensure everyone remains vigilant. We will provide updates as more information becomes available. #Ledger #SecurityAlert #StaySafe #CryptoNews #CryptoNews🔒📰🚫 $BTC $ETH $BNB

Urgent Warning for Ledger Users: Security Breach in Ledger Connect-Kit

In a recent development, a security breach has been identified in the Ledger Connect-Kit, posing a potential risk to user data. We strongly advise all Ledger users to exercise caution and avoid connecting their devices to any decentralized applications (#dApps) until further notice.Incident Overview: Reports from reliable sources indicate a security compromise within the Ledger Connect-Kit, raising concerns about the safety of user information. The extent of the breach is under investigation by relevant authorities and security experts.Official Statements: While awaiting official updates, it is crucial for Ledger users to prioritize their safety. To stay informed, follow the latest developments on the situation through official channels and statements.Sources: For detailed insights into the security breach and ongoing investigations, refer to the following tweets:SolidProof_io TweetBlockaid_ TweetUser Safety Measures: As a precautionary measure, refrain from connecting your Ledger device to any #dApps until investigations are completed and official sources confirm the safety of the Ledger Connect-Kit.Stay Informed, Stay Safe: Your safety is our top priority. Please share this information within the Ledger community to ensure everyone remains vigilant. We will provide updates as more information becomes available. #Ledger #SecurityAlert #StaySafe #CryptoNews #CryptoNews🔒📰🚫 $BTC $ETH $BNB
Use Authenticator apps like Microsoft authenticator,Google Authenticator to keep your binance account safe. Apply The PassKeys to verify any Processing transaction to be made by yourself. Verify Email to receive news and updates from Binance and easily recover your account when lost. Have a nice trade on Binance. I love Binance #BTC #SecurityAlert #ai #Launchpool
Use Authenticator apps like Microsoft authenticator,Google Authenticator to keep your binance account safe.

Apply The PassKeys to verify any Processing transaction to be made by yourself.

Verify Email to receive news and updates from Binance and easily recover your account when lost.

Have a nice trade on Binance.
I love Binance
#BTC #SecurityAlert #ai #Launchpool
⚠️ Security firm CertiK has issued a warning about the rise in phishing scams impersonating major centralized exchanges and NFT markets. These scams often take the form of fake job announcements, airdrops, or NFT promotions, aiming to lure users into visiting fraudulent websites and potentially stealing their assets. Vigilance is crucial to avoid falling victim to such scams. 🔒🚫 #SecurityAlert #PhishingScams
⚠️ Security firm CertiK has issued a warning about the rise in phishing scams impersonating major centralized exchanges and NFT markets. These scams often take the form of fake job announcements, airdrops, or NFT promotions, aiming to lure users into visiting fraudulent websites and potentially stealing their assets. Vigilance is crucial to avoid falling victim to such scams. 🔒🚫 #SecurityAlert #PhishingScams
Chrome Extension "Bull Checker" Steals Solana DeFi Tokens!URGENT ACTION REQUIRED! Jupiter Exchange exposes malicious Chrome extension "Bull Checker" draining Solana DeFi users' tokens! Appearing harmless, the extension allowed normal dApp interactions but secretly transferred tokens to another wallet. CONFIRMED: Extension vulnerability, NOT wallet vulnerability! PROTECT YOUR ASSETS: REMOVE "Bull Checker" Chrome extension IMMEDIATELY! Double-check your extensions and wallet security! Stay vigilant, Solana community! #Solana #DEFİ #ChromeExtension #SecurityAlert #ProtectYourAssets

Chrome Extension "Bull Checker" Steals Solana DeFi Tokens!

URGENT ACTION REQUIRED!
Jupiter Exchange exposes malicious Chrome extension "Bull Checker" draining Solana DeFi users' tokens!
Appearing harmless, the extension allowed normal dApp interactions but secretly transferred tokens to another wallet.
CONFIRMED: Extension vulnerability, NOT wallet vulnerability!
PROTECT YOUR ASSETS:
REMOVE "Bull Checker" Chrome extension IMMEDIATELY!
Double-check your extensions and wallet security!
Stay vigilant, Solana community!
#Solana #DEFİ #ChromeExtension #SecurityAlert #ProtectYourAssets
🚀Top Project From Recent Funding Round 💰 Chaos Labs 🚀🎉 Chaos Labs has just secured $55.00M in its latest funding round! 🎉 🔹About: Chaos Labs is a pioneering project in the crypto space, focused on automating on-chain risk management and economic security for decentralized finance (DeFi) protocols. Founded in 2021, the project aims to optimize risk management and capital efficiency while safeguarding user funds. By leveraging state-of-the-art monitoring and simulation tools, Chaos Labs helps protocols like Aave, Chainlink, and Uniswap to secure their systems against market manipulation and black swan events. The platform provides real-time data, risk alerts, and automated economic security tooling, enabling protocols to respond swiftly to market volatility. With significant backing from prominent investors such as Galaxy Ventures, PayPal Ventures, and Lightspeed Venture Partners, Chaos Labs has rapidly expanded its customer base. The project is positioned as a key player in addressing the growing demand for robust risk management solutions in the DeFi ecosystem. By automating risk management tasks, Chaos Labs aims to reduce human error and enhance the overall stability and security of DeFi platforms.🚀 🔹 Lead Investors: Galaxy, Coinbase Ventures, HashKey Capital, The Spartan Group, Balaji Srinivasan and many more. 🔹 Total Raised: $75.00M. 🔹 Project Category: Blockchain Service. 🌟If You find this post useful Repost it, Share it with friends & Follow us for More Latest Crypto Analysis, News, Updates & Crypto Insights @crypto_fossa 🦁🙏🏻 #Web3 #DEFİ #AI #SecurityAlert #Binance $BTC {spot}(BTCUSDT) $SOL {spot}(SOLUSDT) $AAVE {spot}(AAVEUSDT)

🚀Top Project From Recent Funding Round 💰 Chaos Labs 🚀

🎉 Chaos Labs has just secured $55.00M in its latest funding round! 🎉
🔹About: Chaos Labs is a pioneering project in the crypto space, focused on automating on-chain risk management and economic security for decentralized finance (DeFi) protocols. Founded in 2021, the project aims to optimize risk management and capital efficiency while safeguarding user funds. By leveraging state-of-the-art monitoring and simulation tools, Chaos Labs helps protocols like Aave, Chainlink, and Uniswap to secure their systems against market manipulation and black swan events. The platform provides real-time data, risk alerts, and automated economic security tooling, enabling protocols to respond swiftly to market volatility. With significant backing from prominent investors such as Galaxy Ventures, PayPal Ventures, and Lightspeed Venture Partners, Chaos Labs has rapidly expanded its customer base. The project is positioned as a key player in addressing the growing demand for robust risk management solutions in the DeFi ecosystem. By automating risk management tasks, Chaos Labs aims to reduce human error and enhance the overall stability and security of DeFi platforms.🚀
🔹 Lead Investors: Galaxy, Coinbase Ventures, HashKey Capital, The Spartan Group, Balaji Srinivasan and many more.
🔹 Total Raised: $75.00M.
🔹 Project Category: Blockchain Service.
🌟If You find this post useful Repost it, Share it with friends & Follow us for More Latest Crypto Analysis, News, Updates & Crypto Insights @Crypto Simbha 🦁🙏🏻
#Web3 #DEFİ #AI #SecurityAlert #Binance $BTC
$SOL
$AAVE
LIVE
--
Hausse
How to avoid getting SOL wallet drained? . . . ... This question is asked by some of our followers: Guys I see a lot of people getting drained and it is my biggest fear. How can I avoid getting drained? I see someone saying they downloaded malware? I only have my wallets logged in on my phone is that a good deterrent or not? Please any advice is much appreciated. It's easy: 1 - Never interact with a dApp you now nothing about. 2 - Never use your main wallet (better be a cold wallet) that hold everything, that's the dumbest thing you can ever do even with the most trust crypto dApps. Always send crypto from your main wallet (that holds everything) to other " Hot Wallets ", the from " Hot Wallet to your " Burner Wallet/s ". " Burner Wallet/s " should only contain what you're willing to risk (Swapping, minting an NFT ...) and it should be the only wallet/s interacting with dApps, even the most trusted ones. 3 - Too greedy and can't control yourself ? No problem, use a " Burner Wallet " loaded only with the amount you're willing " to risk ", so once shit happens, you loose only that amount (it's called damage control). I got drained of $2000 from my wallet, and I think it was caused one of two things. First, approving tokens: if the contract isn't verified or you don't know how it works, it could easily be a smart contract that can manage all of your tokens. The other reason is malicious software on your computer. There are a lot of scammers nowadays on LinkedIn pretending to be recruiters, and then they try to test you by making you solve some code in a repository. If they tell you to download something and run some script in your project, avoid them and block. That's my experience. #Solana⁩ #wallet #Hacked #solanawallet #SecurityAlert
How to avoid getting SOL wallet drained?
.
.
.
...

This question is asked by some of our followers:

Guys I see a lot of people getting drained and it is my biggest fear. How can I avoid getting drained? I see someone saying they downloaded malware? I only have my wallets logged in on my phone is that a good deterrent or not?
Please any advice is much appreciated.

It's easy:

1 - Never interact with a dApp you now nothing about.

2 - Never use your main wallet (better be a cold wallet) that hold everything, that's the dumbest thing you can ever do even with the most trust crypto dApps. Always send crypto from your main wallet (that holds everything) to other " Hot Wallets ", the from " Hot Wallet to your " Burner Wallet/s ".
" Burner Wallet/s " should only contain what you're willing to risk (Swapping, minting an NFT ...) and it should be the only wallet/s interacting with dApps, even the most trusted ones.

3 - Too greedy and can't control yourself ? No problem, use a " Burner Wallet " loaded only with the amount you're willing " to risk ", so once shit happens, you loose only that amount (it's called damage control).

I got drained of $2000 from my wallet, and I think it was caused one of two things. First, approving tokens: if the contract isn't verified or you don't know how it works, it could easily be a smart contract that can manage all of your tokens. The other reason is malicious software on your computer. There are a lot of scammers nowadays on LinkedIn pretending to be recruiters, and then they try to test you by making you solve some code in a repository. If they tell you to download something and run some script in your project, avoid them and block. That's my experience.

#Solana⁩ #wallet #Hacked #solanawallet #SecurityAlert
Breaking News: Security Alert - Malicious Version of Ledger Connect Kit Detected! In a recent development, a malicious version of the #Ledger Connect Kit has been identified and promptly removed. Users are advised not to interact with any #DApps at the moment. A genuine version is being pushed to replace the compromised file. Note- Ledger assures users that their Ledger devices and Ledger Live remain uncompromised. Stay tuned for further updates as the situation evolves. #SecurityAlert #Ledger #CryptoSafety #cryptoniteuae
Breaking News: Security Alert - Malicious Version of Ledger Connect Kit Detected!

In a recent development, a malicious version of the #Ledger Connect Kit has been identified and promptly removed. Users are advised not to interact with any #DApps at the moment. A genuine version is being pushed to replace the compromised file.

Note- Ledger assures users that their Ledger devices and Ledger Live remain uncompromised.

Stay tuned for further updates as the situation evolves. #SecurityAlert #Ledger #CryptoSafety #cryptoniteuae
#SecurityBreach #SecurityAlert 🚨 NOT A DRILL - SECURITY ALERT! 🚨 If you use Windows and encountered OneDrive during setup, pay attention. If you didn't stop it, your private data might be in the cloud. Scammers are attacking Microsoft servers to get into your storage. Here's what to do: 🌐1. Check login attempts at account (dot) live (dot) com/Activity If there are logins that weren't you, change your passwords ASAP. ☁️ 2. Go to onedrive(dot)live(dot)com and review your cloud. Remove anything risky, but save it elsewhere first. Be cautious when deleting; your important data might be there! Some have accidentally shared passwords and info in the cloud. Don't forget to empty the recycle bin after deleting files. 🌐3. Add two-factor authentication (2FA) at account(dot)live(dot)com/proofs/manage/additional .You can use Google Authenticator if you prefer. 💪4. Make sure your password is strong. Consider changing it for added security. 🏈5. Don't save passwords in your browser or manager; type them manually for important accounts. They could do more than take data if they have account access. Prioritize your security now! Update: There's a tactic of setting the account's birth year as 2016+ to limit recovery options. Be cautious.
#SecurityBreach #SecurityAlert 🚨 NOT A DRILL - SECURITY ALERT! 🚨

If you use Windows and encountered OneDrive during setup, pay attention. If you didn't stop it, your private data might be in the cloud. Scammers are attacking Microsoft servers to get into your storage. Here's what to do:

🌐1. Check login attempts at account (dot) live (dot) com/Activity
If there are logins that weren't you, change your passwords ASAP.

☁️ 2. Go to onedrive(dot)live(dot)com and review your cloud. Remove anything risky, but save it elsewhere first. Be cautious when deleting; your important data might be there! Some have accidentally shared passwords and info in the cloud. Don't forget to empty the recycle bin after deleting files.

🌐3. Add two-factor authentication (2FA) at account(dot)live(dot)com/proofs/manage/additional .You can use Google Authenticator if you prefer.

💪4. Make sure your password is strong. Consider changing it for added security.

🏈5. Don't save passwords in your browser or manager; type them manually for important accounts.

They could do more than take data if they have account access. Prioritize your security now!

Update: There's a tactic of setting the account's birth year as 2016+ to limit recovery options. Be cautious.
1. Trezor, a hardware wallet provider, confirmed a security breach involving its third-party email provider. 2. Malicious emails, appearing to be from Trezor's official domain, urged users to upgrade their "network" or risk losing funds. 3. The deceptive emails included a harmful link redirecting users to a page requesting their seed phrase. 4. Trezor deactivated the malicious link promptly, containing the potential threat and assuring the link itself was harmless. 5. User funds remain secure unless the recovery seed was entered; affected users are advised to transfer funds to a new wallet for added security. 6. The unauthorized emails impersonated Trezor, addressing subscribers to their newsletter. 7. If users haven't disclosed their recovery seed, their assets are secure; disclosing the recovery seed requires immediate fund transfer. 8. This incident is part of a series of coordinated phishing attacks affecting various crypto platforms, including WalletConnect, Token Terminal, De.Fi, and Cointelegraph. 9. Scammers used enticing offers of fraudulent airdrops to trick users into taking action. 10. Users are warned to exercise caution and verify communications directly from platforms to avoid falling victim to phishing attempts in the crypto space. #trezor #SecurityAlert #wallet
1. Trezor, a hardware wallet provider, confirmed a security breach involving its third-party email provider.

2. Malicious emails, appearing to be from Trezor's official domain, urged users to upgrade their "network" or risk losing funds.

3. The deceptive emails included a harmful link redirecting users to a page requesting their seed phrase.

4. Trezor deactivated the malicious link promptly, containing the potential threat and assuring the link itself was harmless.

5. User funds remain secure unless the recovery seed was entered; affected users are advised to transfer funds to a new wallet for added security.

6. The unauthorized emails impersonated Trezor, addressing subscribers to their newsletter.

7. If users haven't disclosed their recovery seed, their assets are secure; disclosing the recovery seed requires immediate fund transfer.

8. This incident is part of a series of coordinated phishing attacks affecting various crypto platforms, including WalletConnect, Token Terminal, De.Fi, and Cointelegraph.

9. Scammers used enticing offers of fraudulent airdrops to trick users into taking action.

10. Users are warned to exercise caution and verify communications directly from platforms to avoid falling victim to phishing attempts in the crypto space.

#trezor #SecurityAlert #wallet
🚨 **Whale Loses 1,155 BTC ($71M) Due to Copy-Paste Error!** 🚨 A devastating mistake cost a whale 1,155 BTC, equivalent to $71 million. Here’s how it happened: 1️⃣ **Hacker's Watchful Eye:** The hacker monitored the whale’s blockchain activity and created a similar-looking address. 2️⃣ **Phishing Setup:** The hacker transferred 0 ETH to the whale’s wallet to embed the phishing address in the transaction history. 3️⃣ **Fatal Error:** The whale, intending to transfer BTC, copied and pasted the phishing address from the transaction history, as it looked almost identical to their intended address. ⚠️ **Stay Vigilant!** Always double-check addresses before making transactions to avoid costly mistakes. #CryptoNews #Bitcoin #Blockchain #SecurityAlert #BTC☀️
🚨 **Whale Loses 1,155 BTC ($71M) Due to Copy-Paste Error!** 🚨

A devastating mistake cost a whale 1,155 BTC, equivalent to $71 million. Here’s how it happened:

1️⃣ **Hacker's Watchful Eye:** The hacker monitored the whale’s blockchain activity and created a similar-looking address.

2️⃣ **Phishing Setup:** The hacker transferred 0 ETH to the whale’s wallet to embed the phishing address in the transaction history.

3️⃣ **Fatal Error:** The whale, intending to transfer BTC, copied and pasted the phishing address from the transaction history, as it looked almost identical to their intended address.

⚠️ **Stay Vigilant!** Always double-check addresses before making transactions to avoid costly mistakes.

#CryptoNews #Bitcoin #Blockchain #SecurityAlert #BTC☀️
Utforska de senaste kryptonyheterna
⚡️ Var en del av de senaste diskussionerna inom krypto
💬 Interagera med dina favoritkreatörer
👍 Ta del av innehåll som intresserar dig
E-post/telefonnummer