Learn about cryptography, security management, network and computer security, information security, personal security, and blockchain security.
Common Scams on Mobile Devices
Mobile phones are an essential part of our lives. They are so intertwined with our digital identities that they could become our greatest vulnerability.
What Is PGP?
PGP has been an essential tool for data protection and is now used in a wide range of applications, providing privacy, security, and authentication.
What is Symmetric Key Cryptography?
Symmetric key algorithms are widely applied in various types of computer systems to enhance data security. Learn about Symmetric Key Cryptography
What is a Dusting Attack?
Have you received a small amount of unsolicited cryptocurrency into your wallet? You may be a victim of a Dusting Attack. Learn about dusting attacks.
Pyramid and Ponzi Schemes
Being able to identify pyramid and ponzi schemes and understanding how they work is of great importance. Learn how you can protect yourself in this Article.
Symmetric vs. Asymmetric Encryption
Cryptographic systems are currently divided into two major fields of study: symmetric and asymmetric cryptography. Find out the differences in this article
What Is a 51% Attack?
What is a 51% Attack? What is a Majority Attack? Learn all about this type of blockchain attack and how different blockchains prevent them from occurring.
What Is a DoS Attack?
In short, a DoS attack - or Denial-of-Service attack - is a method used to disrupt legitimate users' access to a target network or web resource.
General Security Principles
Follow the three main security principles outlined in this article to mitigate some risks associated with holding, using, and trading cryptocurrencies.
What Is Social Engineering?
Cybercriminals are constantly looking for new methods to deceive users, steal their funds and sensitive information, it is important to educate yourself.
Why Public WiFi Is Insecure
For many people, being able to connect to free internet on the go seems ideal. However, there are more risks to using public WiFi than you may realize.
What Is a Replay Attack?
A cyber attack in which the malicious entity intercepts and then repeats a valid data transmission going through a network. Read more on Binance Academy.
What Is Public Key Cryptography?
Also known as asymmetric cryptography. A framework that uses both a private and a public key, as opposed to the single key used in symmetric cryptography.
History of Cryptography
Writing codes and ciphers for secure communication is one of the most important elements that makes modern cryptocurrencies and blockchains possible.
What Is a Multisig Wallet?
Multisig stands for multi-signature, a specific type of digital signature that makes it possible for two or more users to sign documents as a group.
What is Ransomare and how can it affect you? Learn about Ransomware and how can you protect yourself from becoming a victim on Binance Academy.
What Is Cryptojacking?
Cryptojacking is a malicious activity, in which an infected device is used to secretly mine for cryptocurrencies. Find out what you can do to protect yourself.
What Is a Keylogger?
Complete guide to Keyloggers: What they are, how to protect yourself and how to detect and remove Keyloggers.
What Is Phishing?
Phishing is a type of cyber attack where a malicious actor deceives people to collect their sensitive information. Learn about Phishing on Binance Academy.
Sybil Attacks Explained
What is a Sybil Attack? Learn about Sybil Attacks, their effect, and how Blockchains protect against them by using different consensus mechanisms.
What Is Trust Wallet?
Trust Wallet is the official wallet for Binance. Find out what makes Trust Wallet the most secure cryptocurrency wallet on Binance Academy.
Keeping Your Private Key Secure
Public and private keys - how to use the former one on your daily basis and how to protect the latter against access by an unauthorized person.