Security

Category

Learn about cryptography, security management, network and computer security, information security, personal security, and blockchain security.

What Is a 51% Attack?

What Is a 51% Attack?

What is a 51% Attack? What is a Majority Attack? Learn all about this type of blockchain attack and how different blockchains prevent them from occurring.
What Is a DoS Attack?

What Is a DoS Attack?

In short, a DoS attack - or Denial-of-Service attack - is a method used to disrupt legitimate users' access to a target network or web resource.
Pyramid and Ponzi Schemes

Pyramid and Ponzi Schemes

Being able to identify pyramid and ponzi schemes and understanding how they work is of great importance. Learn how you can protect yourself in this Article.
What Is Social Engineering?

What Is Social Engineering?

Cybercriminals are constantly looking for new methods to deceive users, steal their funds and sensitive information, it is important to educate yourself.
General Security Principles

General Security Principles

Follow the three main security principles outlined in this article to mitigate some risks associated with holding, using, and trading cryptocurrencies.
Why Public WiFi Is Insecure

Why Public WiFi Is Insecure

For many people, being able to connect to free internet on the go seems ideal. However, there are more risks to using public WiFi than you may realize.
What Is a Replay Attack?

What Is a Replay Attack?

A cyber attack in which the malicious entity intercepts and then repeats a valid data transmission going through a network. Read more on Binance Academy.
What Is Public Key Cryptography?

What Is Public Key Cryptography?

Also known as asymmetric cryptography. A framework that uses both a private and a public key, as opposed to the single key used in symmetric cryptography.
What Is a Dusting Attack?

What Is a Dusting Attack?

Have you received a small amount of unsolicited cryptocurrency into your wallet? You may be a victim of a Dusting Attack. Learn about dusting attacks.
History of Cryptography

History of Cryptography

Writing codes and ciphers for secure communication is one of the most important elements that makes modern cryptocurrencies and blockchains possible.
What Is a Multisig Wallet?

What Is a Multisig Wallet?

Multisig stands for multi-signature, a specific type of digital signature that makes it possible for two or more users to sign documents as a group.
Ransomware Explained

Ransomware Explained

What is Ransomare and how can it affect you? Learn about Ransomware and how can you protect yourself from becoming a victim on Binance Academy.
What Is Cryptojacking?

What Is Cryptojacking?

Cryptojacking is a malicious activity, in which an infected device is used to secretly mine for cryptocurrencies. Find out what you can do to protect yourself.
What Is a Keylogger?

What Is a Keylogger?

Complete guide to Keyloggers: What they are, how to protect yourself and how to detect and remove Keyloggers.
Sybil Attacks Explained

Sybil Attacks Explained

What is a Sybil Attack? Learn about Sybil Attacks, their effect, and how Blockchains protect against them by using different consensus mechanisms.
What Is Phishing?

What Is Phishing?

Phishing is a type of cyber attack where a malicious actor deceives people to collect their sensitive information. Learn about Phishing on Binance Academy.
What Is Trust Wallet?

What Is Trust Wallet?

Trust Wallet is the official wallet for Binance. Find out what makes Trust Wallet the most secure cryptocurrency wallet on Binance Academy.
Wallets: Online and Offline

Wallets: Online and Offline

Online and offline crypto wallets - when to trust the third party about storing your key online and when to better focus on the offline version.
Common Scams

Common Scams

Pyramid schemes, phishing sites and phishing e-mail campaigns and fake wallet software. Are all these terms new to you? Learn about them on Binance Academy.
Identifying a Scammer

Identifying a Scammer

Scammers - there are more of them in the virtual world than in the ones you possibly meet every day on the street. How to defend against them?
Keeping Your Private Key Secure

Keeping Your Private Key Secure

Public and private keys - how to use the former one on your daily basis and how to protect the latter against access by an unauthorized person.