This site uses cookies. [More] [No problem]



Securing Your Crypto Storage #YourKeysYourResponsibility

All how-to and guides where you learn how to improve the security of your crypto storage without a phd in computer science (for the most part).

 

CRYPTO STORAGE How to secure your IOTA wallet and migrate from Light Wallet to Trinity

CRYPTO STORAGE Virtual Machine Crypto Wallets: Should You Bother?

CRYPTO STORAGE Redeeming forked coins: Sweeping private keys and sweeping addresses

CRYPTO STORAGE Tiered Crypto Storage: How to do it right

CRYPTO STORAGE How to Safely Backup Your Cryptocurrency Wallet Keys

Don't Be PWNED #CryptoOPsec

Tutorials on how to manage your email or messaging apps in a way that will help your crypto opsec, even though it doesn't directly handle your crypto storage.

 

CRYPTO OPSEC List of tools for scam detection

CRYPTO OPSEC Twitter Memes: The most deceptive way of infecting your devices with cryptostealers

CRYPTO OPSEC The Basics of Securing Your Mac and iPhone Against Malicious Threats

CRYPTO OPSEC How to avoid email address reuse, but only having a single inbox

CRYPTO OPSEC Security Threats for Crypto Traders in 2020

How You Get Targeted #InTheNews

The bits from cyber security news that a cryptocurrency trader should really be aware of. They are the most common ways crypto traders get targeted.

 

IN THE NEWS Mac malware “CookieMiner” targets crypto traders, aims to bypass 2FA on exchanges and web wallets

IN THE NEWS MacOS Malware Targeting Crypto Community, Spreading Through Admin Impostors

IN THE NEWS Stealer Malware Targeting Cryptocurrency Owners Got Affordable

IN THE NEWS The New Dangers of Telegram Messenger - Telegrab & Beyond

IN THE NEWS 2018 AKA The Year When Crypto-focused Malware Became The New Standard

Recommended Trading Platforms

Contacts