#SECURITY AND SAFETY

Anycoin Direct

Security Risk: please check your Google Authenticator App

In this blog, we would like to make you aware of the latest Google Authenticator App update and its potential security risks.

Read
Mike Hesp

The 3 most common types of crypto scams - How to recognize crypto scams?

In this article, we talk about the characteristics of malicious crypto projects, ways in which they try to make money and examples of dubious coins in the past.

Read
Ted Maas

What is Mars Stealer? The new crypto stealing malware

Online wallet holders and frequent downloaders beware! A new type of malware is targeting browser extension wallets like MetaMask

Read
Kevin van der Linden

Protect yourself - Regarding scammers, fake profiles and private keys

In this blog, we are going to address several methods we encounter on a daily basis. With these tips, we hope to prepare you as best as we can.

Read
Ted Maas

51% attacks – How to counter them with MESS or DPoS

Will all future crypto’s benefit from a Delegated-Proof-of-Stake algorithm, or will other solutions such as ETC’s MESS be the solution? Find out in part 2 on 51% attacks.

Read
Ted Maas

51% Attack - How to take over the blockchain

But what does a 51% attack actually mean and how often does it happen? In today’s article we are going to take a look at the definition of a 51% attack and some famous examples that happened throughout the years.

Read
Ted Maas
Ted Maas

Do Your Own Research (DYOR)

The number of alternative cryptocurrencies is growing every day and not all of them will live up to the claims and expectations that are being raised by their development teams. To help you get an overview of the most important factors to take into consideration, we have created this article.

Read