SMS Hijacking

Having just encouraged the use of 2FA as standard for custodial services, we now have to warn that choosing SMS as the 2FA can create a serious vulnerability via SMS hijacking. If attackers know your mobile number and provider, and have harvested personal information from OSINT, they can impersonate you with your Mobile Service Provider… Continue reading SMS Hijacking

Brute Force Attack

It’s one of the oldest and most obvious techniques for trying to steal someone’s password, running a software that churns through password options. This can be used in conjunction with information known about the user from OSINT – Open Source Intelligence. The best way to mitigate this kind of threat is to use two-factor authentication… Continue reading Brute Force Attack

Returning To The Concept of Custody

If you read the first article in this section you’ll be familiar with the concept of custody, which is central to cryptocurrency ownership. Custody refers to how you manage responsibility for the one critical piece of information that enables control of your crypto – a Private Key or Seed. As cryptocurrency works without a central authority like a bank,… Continue reading Returning To The Concept of Custody

Security best practice

What you’ll learn You are ultimately responsible for your crypto Things to protect against; accidental loss & theft Best practice & sleeping soundly at night If you’ve reached this stage in our series of articles on how to use cryptocurrency, you’ll have invested considerable time and hopefully some of your money; putting into practice what… Continue reading Security best practice