Security

Category

Learn about cryptography, security management, network and computer security, information security, personal security, and blockchain security.

Threshold Signatures Explained

Threshold Signatures Explained

In this article, we will cover what a Threshold Signature Scheme is and what are the potential advantages it brings to the blockchain space.
Common Scams on Mobile Devices

Common Scams on Mobile Devices

Mobile phones are an essential part of our lives. They are so intertwined with our digital identities that they could become our greatest vulnerability.
What Is PGP?

What Is PGP?

PGP has been an essential tool for data protection and is now used in a wide range of applications, providing privacy, security, and authentication.
Symmetric vs. Asymmetric Encryption

Symmetric vs. Asymmetric Encryption

Cryptographic systems are currently divided into two major fields of study: symmetric and asymmetric cryptography. Find out the differences in this article
What is Symmetric Key Cryptography?

What is Symmetric Key Cryptography?

Symmetric key algorithms are widely applied in various types of computer systems to enhance data security. Learn about Symmetric Key Cryptography
What Is Social Engineering?

What Is Social Engineering?

Cybercriminals are constantly looking for new methods to deceive users, steal their funds and sensitive information, it is important to educate yourself.
What Is a Replay Attack?

What Is a Replay Attack?

A cyber attack in which the malicious entity intercepts and then repeats a valid data transmission going through a network. Read more on Binance Academy.
What is Public Key Cryptography?

What is Public Key Cryptography?

Also known as asymmetric cryptography. A framework that uses both a private and a public key, as opposed to the single key used in symmetric cryptography.
Why Public WiFi Is Insecure

Why Public WiFi Is Insecure

For many people, being able to connect to free internet on the go seems ideal. However, there are more risks to using public WiFi than you may realize.
History of Cryptography

History of Cryptography

Writing codes and ciphers for secure communication is one of the most important elements that makes modern cryptocurrencies and blockchains possible.
What Is a DoS Attack?

What Is a DoS Attack?

In short, a DoS attack - or Denial-of-Service attack - is a method used to disrupt legitimate users' access to a target network or web resource.
What Is a Multisig Wallet?

What Is a Multisig Wallet?

Multisig stands for multi-signature, a specific type of digital signature that makes it possible for two or more users to sign documents as a group.
Keeping Your Private Key Secure

Keeping Your Private Key Secure

Public and private keys - how to use the former one on your daily basis and how to protect the latter against access by an unauthorized person.
What Is Trust Wallet?

What Is Trust Wallet?

Trust Wallet is the official wallet for Binance. Find out what makes Trust Wallet the most secure cryptocurrency wallet on Binance Academy.
Sybil Attacks Explained

Sybil Attacks Explained

What is a Sybil Attack? Learn about Sybil Attacks, their effect, and how Blockchains protect against them by using different consensus mechanisms.
What is a Dusting Attack?

What is a Dusting Attack?

Have you received a small amount of unsolicited cryptocurrency into your wallet? You may be a victim of a Dusting Attack. Learn about dusting attacks.
What Is Phishing?

What Is Phishing?

Phishing is a type of cyber attack where a malicious actor deceives people to collect their sensitive information. Learn about Phishing on Binance Academy.
What Is a Keylogger?

What Is a Keylogger?

Complete guide to Keyloggers: What they are, how to protect yourself and how to detect and remove Keyloggers.
General Security Principles

General Security Principles

Follow the three main security principles outlined in this article to mitigate some risks associated with holding, using, and trading cryptocurrencies.
Pyramid and Ponzi Schemes

Pyramid and Ponzi Schemes

Being able to identify pyramid and ponzi schemes and understanding how they work is of great importance. Learn how you can protect yourself in this Article.
What Is a 51% Attack?

What Is a 51% Attack?

What is a 51% Attack? What is a Majority Attack? Learn all about this type of blockchain attack and how different blockchains prevent them from occurring.
What Is Cryptojacking?

What Is Cryptojacking?

Cryptojacking is a malicious activity, in which an infected device is used to secretly mine for cryptocurrencies. Find out what you can do to protect yourself.
Ransomware Explained

Ransomware Explained

What is Ransomare and how can it affect you? Learn about Ransomware and how can you protect yourself from becoming a victim on Binance Academy.