Starcoinz logo

"phishing attacks"

Search our executive blockchain insights and services.

phishing attempts

How to Recognise Phishing Attempts — With Real-Life Examples

★★★★★

How to Recognise Phishing Attempts — With Real-Life Examples Phishing is in every scammer’s toolbox. Here are real-life examples of phishing attempts to help you better detect the threat. How to Recognise Phishing Attempts — With Real-Life ExamplesLevel UpNEWIndividualsBusinessesDevelopersDisc…

Learn More
phishing attempts

How to Recognise Phishing Attempts — With Real-Life Examples

★★★★★

How to Recognise Phishing Attempts — With Real-Life Examples Phishing is in every scammer’s toolbox. Here are real-life examples of phishing attempts to help you better detect the threat. How to Recognise Phishing Attempts — With Real-Life ExamplesLevel UpNEWIndividualsBusinessesDevelopersDisc…

Learn More
products services

Anti-Phishing Code

★★★★★

Anti-Phishing Code A succinct definition of Anti-Phishing Code Anti-Phishing CodeLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyGLOSSARYANTI-PHISHING CODECopy linkShare on TwitterShare on FacebookShare on LinkedinAnti-Phishing CodeAn Anti-Phishing Code is a security feature used by cryptoc…

Learn More
crypto scams

Understanding AI Scams in Cryptocurrency: Tips to Protect Yourself

★★★★★

Understanding AI Scams in Cryptocurrency: Tips to Protect Yourself AI crypto scams, including celebrity deepfakes, voice cloning, and AI phishes, are on the rise. Here’s how to protect yourself. Understanding AI Scams in Cryptocurrency: Tips to Protect YourselfLevel UpNEWIndividualsBusinessesDevel…

Learn More
social engineering

How to Protect Against Crypto Hacks and Social Engineering

★★★★

How to Protect Against Crypto Hacks and Social Engineering Social engineering is a hazard in crypto, enabling hackers to manipulate users and steal funds. Learn how to protect against crypto hacks and scams. How to Protect Against Crypto Hacks and Social EngineeringLevel UpNEWIndividualsBusinessesDe…

Learn More
token standard

Crypto.com Glossary: Your Guide to Key Terms and Jargon in Blockchain and Cryptocurrency

★★★★

Crypto.com Glossary: Your Guide to Key Terms and Jargon in Blockchain and Cryptocurrency Check Crypto.com's crypto glossary to learn what commonly used terms used in the crypto-verse mean. Crypto.com Glossary: Your Guide to Key Terms and Jargon in Blockchain and CryptocurrencyLevel UpNEWIndividualsB…

Learn More
your account

What Are Passkeys and How to Use Them With Your Crypto.com Account

★★★★

What Are Passkeys and How to Use Them With Your Crypto.com Account Passkeys are a safer alternative to passwords that can be used alone or with your hardware token. Here’s how to set one up for your Crypto.com account. What Are Passkeys and How to Use Them With Your Crypto.com AccountLevel UpNEWIn…

Learn More
your account

Protect Your Crypto.com Account With Security & Data Privacy Best Practices

★★★★

Protect Your Crypto.com Account With Security & Data Privacy Best Practices Security is a Shared Responsibility Protect Your Crypto.com Account With Security & Data Privacy Best PracticesLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyUNIVERSITYSecurity29 Jun 2022|BEGINNERS|6 MIN READProtec…

Learn More
your account

Protect Your Crypto.com Account With Security & Data Privacy Best Practices

★★★★

Protect Your Crypto.com Account With Security & Data Privacy Best Practices Security is a Shared Responsibility Protect Your Crypto.com Account With Security & Data Privacy Best PracticesLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyUNIVERSITYSecurity29 Jun 2022|BEGINNERS|6 MIN READProtec…

Learn More
rug pulls

7 Common Crypto Scams and How to Avoid Them

★★★★

7 Common Crypto Scams and How to Avoid Them Ever heard of rug pulls and pig butchering? Be smarter than the scammers and learn how common crypto scams work in detail. 7 Common Crypto Scams and How to Avoid ThemLevel UpNEWIndividualsBusinessesDevelopersDiscoverCompanyUNIVERSITYSecurity4 Sep 2022|BEGI…

Learn More