This site uses cookies. [More] [No problem]

 

From the News #CyberSecurity

Here you can find the bare necessities. The bits from cyber security news a cryptocurrency trader on investor should really be aware of: The most common malware targeting crypto traders, the most dangerous Nigerian prince emails. the PSA's.

 

IN THE NEWS Mac malware “CookieMiner” targets crypto traders, aims to bypass 2FA on exchanges and web wallets

IN THE NEWS Twitter Memes: The most deceptive way of infecting your devices with cryptostealers

IN THE NEWS MacOS Malware Targeting Crypto Community, Spreading Through Admin Impostors

IN THE NEWS Stealer Malware Targeting Cryptocurrency Owners Got Affordable

IN THE NEWS Security Threats for Crypto Traders in 2020

IN THE NEWS 2018 AKA The Year When Crypto-focused Malware Became The New Standard

Crypto Security Primers #GoodOpsec

Here you will learn about how to approach security issues that come with different types of wallets. For a practical solution, we are linking resources from elsewhere.

 

PRIMER List of tools for scam detection

PRIMER The Basics of Securing Your Mac and iPhone Against Malicious Threats

PRIMER Tiered Device Management

PRIMER Backups for the paranoid

Tutorials #CryptoSecurity

All how-to and guides where you learn how to do easy stuff which will still improve your security.

 

TUTORIAL How to secure your IOTA wallet and migrate from Light Wallet to Trinity

TUTORIAL How to avoid email address reuse with a single inbox

TUTORIAL Virtual Machine Crypto Wallets: Should You Bother?

Crypto Security Homelab #YourKeysYourCoin

This is where the tech-heavy stuff happens. The phoney bitcoin politician who doesn't even own bitcoin, AKA Andreas Antonopoulos, would disapprove and send you to buy a black box product like Ledger.

 

STAY AWAY SAVE LIVES How to secure your IOTA wallet and migrate from Light Wallet to Trinity

STAY AWAY SAVE LIVES Virtual Machine Crypto Wallets: Should You Bother?

STAY AWAY SAVE LIVES Backups for the paranoid

 
 

All Crypto Security and OPSEC Posts

SOFTWARE The New Dangers of Telegram Messenger - Telegrab & Beyond

As Telegram exploits from May 2018 are not really juicy enough for the netsec community, malicious campaigns are passing quietly under the radar. - On 23 May 2018

In May 2018 new attacks on the desktop version of the Telegram messenger were reported. The reports weren’t specific regarding the targets but since Telegram is the most popular IM in the crypto co...

Read post in full >>

IN-THE-NEWS Mac malware “CookieMiner” targets crypto traders, aims to bypass 2FA on exchanges and web wallets

Here's what the malware does and how to protect your crypto. - On 07 Apr 2020

Palo Alto Networks’ Unit 42 reported a new malware that targets Mac users. The malware was developed from code used for older campaigns and so it also goes for the obvious steady revenue generatio...

Read post in full >>

PRIMER List of tools for scam detection

List of browser tools to up your security and avoid fraudulent websites in general - not only when trading crypto. - On 07 Apr 2020

This is a list of security tools that are helpful in avoiding cryptocurrency scams, impostors and phishing. We will be updating the list regularly, and you are all invited to submit your favorite ...

Read post in full >>

IN-THE-NEWS Twitter Memes: The most deceptive way of infecting your devices with cryptostealers

A short call to those of you who have a wallet for daily expenses or trading on a computer or phone that is used for 'safe' day-to-day work and browsing. - On 07 Apr 2020

If you have been around digital currencies for a bit, you probably know that in terms of security the only thing you can say with certainty is the next vulnerability will be an unexpected one. We ...

Read post in full >>

PRIMER The Basics of Securing Your Mac and iPhone Against Malicious Threats

The business of cyber crime is extremely good at following the money, you can be sure as a cryptocurrency holder you are a particularly hot article. - On 07 Apr 2020

It wasn't that long ago that Apple's macOS and iOS operating systems were considered immune to malware threats. However, those days are gone - but that’s what you get for relying on security due t...

Read post in full >>

IN-THE-NEWS MacOS Malware Targeting Crypto Community, Spreading Through Admin Impostors

The variants of the particular malware will change but phishing and impostors are not going anywhere. - On 07 Apr 2020

The SANS Internet Storm Center published a report on 29th June 2018 analyzing a new malware that targets the cryptocurrency community. This time the malware targets MacOS, at this stage it is not v...

Read post in full >>

IN-THE-NEWS Stealer Malware Targeting Cryptocurrency Owners Got Affordable

Clever business scheme emerged late in May 2018 that will make a good social engineer a lot of money. - On 07 Apr 2020

The cybersecurity buzz from past weeks focused mostly on ransomware as far as cryptospace is concerned. Ransomware or repurposed ransomware that mines Monero are still the bulk of threats that are ...

Read post in full >>

IN-THE-NEWS Security Threats for Crypto Traders in 2020

What kind of threats can we as crypto traders and hodlers expect in 2020 and what are the ways to protect our holdings? - On 07 Apr 2020

Malware and exploits are a real maturing industry, the times are long gone when you had to be a literal high-tech lowlife in order to hack someone. As we reported back in 2018, you can get Malware...

Read post in full >>

HOMELAB How to secure your IOTA wallet and migrate from Light Wallet to Trinity

All the IOTA storage options you have in 2019, IOTA cold storage homelab and a short guide to migrating IOTA from Light Wallet to Trinity Wallet (and Ledger, if you wish). - On 07 Apr 2020

Quick Intro to IOTA and Tangle IOTA is a transactional and data transfer layer aiming at the Internet of Things. It uses a distributed ledger called Tangle which scales better than blockchain. Th...

Read post in full >>

IN-THE-NEWS 2018 AKA The Year When Crypto-focused Malware Became The New Standard

And a bonus: If you're an app developer, best way to get paid in crypto. - On 07 Apr 2020

Related: Tiered Device Management for Crypto Holders They say that it ain’t good if people don’t steal it - by this logic, crypto is in a massive fundamental bull run. While even in 2017 crypto ...

Read post in full >>

TUTORIAL How to avoid email address reuse with a single inbox

A quick way to setup your mailbox in such a way that you will not have to reuse your email address again. - On 07 Apr 2020

One thing we are probably not going to stop seeing anytime soon in the crypto space is phishing: random people finding out your email address belongs to someone who owns cryptocurrencies and might ...

Read post in full >>

HOMELAB Virtual Machine Crypto Wallets: Should You Bother?

When does it make sense to put a crypto wallet on a virtual machine? Includes a full walkthrough tutorial on how to set up a cryptocurrency wallet in Virtualbox. - On 07 Apr 2020

Does it make sense to install your desktop crypto wallets on a virtual machine? Only in some cases. Don’t Do It: Virtual Machine Bitcoin Wallet for Security If you were looking for a way to set ...

Read post in full >>

PRIMER Tiered Device Management

A quick guide for cryptocurrency investors on how to do tiered devices right. It is not even such an inconvenience to have separate devices for different activities. - On 07 Apr 2020

If you hold cryptocurrencies, there’s never too much security. It is not even such an inconvenience to have separate devices for different activities, though: That’s cold, warm, hot and also beater...

Read post in full >>

HOMELAB Backups for the paranoid

Secure backup solutions - digital and non-digital - are a big theme, and this is a big post that will be updated when new ideas emerge. - On 07 Apr 2020

Secure backup solutions – digital and non-digital – are a big theme. It is usually avoided - as someone pointed out in the r/IOTA, people like to write up creative hacking solutions for all kind...

Read post in full >>

SOFTWARE Redeeming forked coins: Sweeping private keys and sweeping addresses

What is sweeping, when do which one and a tutorial for safe redeeming of BCH and BTG. - On 01 Feb 2018

If you just want to know how to redeem Bitcoin Cash (BCH), jump to the relevant section here. If you just want to know how to redeem Bitcoin Gold (BTG), jump to the relevant section here. Swe...

Read post in full >>

Like us on all the networks