</ Security Guide >

Protect Your Crypto

Stay safe from scams, hacks, and social engineering attacks in the crypto space.

Latest Threat Alert

New Phishing Campaign Targeting MetaMask Users: Scammers are sending emails claiming to be from MetaMask support, asking users to verify their wallets by entering their seed phrases. MetaMask will never ask for your seed phrase via email or any other communication channel.

Updated: Today

Essential Security Practices

Use Hardware Wallets

Store your cryptocurrency on hardware wallets like Ledger or Trezor instead of keeping them on exchanges. Hardware wallets keep your private keys offline, making them immune to online hacking attempts.

Updated: 2 days ago

Beware of Phishing Attacks

Always verify URLs before entering sensitive information. Scammers create fake websites that look identical to legitimate crypto platforms. Check for subtle misspellings or different domain extensions.

Updated: Today

Enable Two-Factor Authentication (2FA)

Always use 2FA for all your crypto accounts. Avoid SMS-based 2FA when possible as it's vulnerable to SIM swapping attacks. Instead, use authenticator apps like Google Authenticator or Authy.

Updated: 1 week ago

Watch Out for Social Engineering

Be suspicious of unsolicited messages on Discord, Telegram, or Twitter offering free crypto or investment opportunities. Legitimate projects will never ask for your private keys or seed phrases.

Updated: 3 days ago

Verify Smart Contracts

Before interacting with a smart contract, verify its code on platforms like Etherscan. Look for verified contracts and check community reviews. Be especially cautious with contracts that request unlimited token approvals.

Updated: Today

Use Separate Email Addresses

Create a dedicated email address for your crypto accounts that you don't use anywhere else. This reduces the risk of your crypto accounts being compromised if other services experience data breaches.

Updated: 5 days ago

Beware of Clipboard Hijacking Malware

Some malware can detect when you copy a crypto address and replace it with the attacker's address. Always double-check the address after pasting it before confirming any transaction.

Updated: 1 day ago

Use a Secure Internet Connection

Avoid accessing your crypto accounts on public Wi-Fi networks. If you must use public Wi-Fi, connect through a VPN to encrypt your connection and protect your data from potential eavesdroppers.

Updated: 1 week ago

Stay Informed

The crypto security landscape is constantly evolving. We update this page regularly with the latest threats and protection measures. Bookmark this page and check back often to stay protected.

Have you encountered a new scam or security threat? Help the community by reporting it to us.