<?xml version="1.0" encoding="UTF-8" ?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:media="http://search.yahoo.com/mrss/"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
>
<channel>
		<title>Avoid-scams Archives - Kenkarlo.com</title>
	<atom:link href="https://kenkarlo.com/category/avoid-scams/feed" rel="self" type="application/rss+xml" />
	<link>https://kenkarlo.com/category/avoid-scams/feed</link>
	  	<description>A global media blog focusing in blockchain, cryptocurrency, technology, games, gadgets, business, social media, seo, fintech, and security.</description>
  	<language>en-US</language>
 		<item>
    	<title>New to Crypto? Stay Safe and Avoid These Common Scams</title>
    	<atom:link href="https://kenkarlo.com/articles/new-to-crypto-stay-safe-avoid-these-common-scams/feed" rel="self" type="application/rss+xml" />
    	<link>https://kenkarlo.com/articles/new-to-crypto-stay-safe-avoid-these-common-scams</link>
    	<dc:creator><![CDATA[Crypto Staff, Contributor]]></dc:creator>
    	<atom:author>
			<atom:name>Crypto Staff, Contributor</atom:name>
			<atom:uri>https://kenkarlo.com/author/cryptostaff</atom:uri>
		</atom:author>
    	<pubDate>Thu, 18 Feb 2021 01:33:26 PST</pubDate>
    	<atom:updated>2021-02-18T01:33:26Z</atom:updated>
    	<guid isPermaLink="false">https://kenkarlo.com/p/318</guid>
    	<category><![CDATA[Avoid scams]]></category>
    	<description>While Bitcoin and other cryptocurrencies themselves might be safe, the shaky link in the equation is something you may not expect: you are the weak link.  </description>
        <content:encoded><![CDATA[<p><span style="font-weight: 400;">The surge in prices and popularity in <a data-toggle="tooltip" data-placement="top"  href="/tags/bitcoin" target="_blank" rel="noopener">Bitcoin</a> and Ethereum only means that virtual currencies often become a target for hackers that want to take advantage of these valuable assets.</span></p>
<p><span style="font-weight: 400;">Even the economics of hacking suggests that cybercriminals will continue to drift towards digital currencies as they rise in value and become more prevalent in our daily lives. Not only that but tracking the work of hackers is often problematic since their footprints can be eliminated digitally. When a crypto account is attacked, investors do not have any support legally since the virtual coins are still unchecked by a central bank or a government entity. </span></p>
<p><span style="font-weight: 400;">Moreover, it makes sense to wonder why you should bother securing your cryptocurrencies when some investors claim that Bitcoin is meant to be the </span><a data-toggle="tooltip" data-placement="top"  href="https://bitcoinmagazine.com/articles/dont-fall-for-the-biggest-mistake-in-bitcoin" data-toggle="tooltip" data-placement="top"><span style="font-weight: 400;">world's safest financial solution.</span></a><span style="font-weight: 400;"> While Bitcoin and other cryptocurrencies themselves might be safe, the shaky link in the equation is something you may not expect: you are the weak link.  </span></p>
<p><span style="font-weight: 400;">To put it in simple terms, you're your own bank, and as such, you're entirely accountable for safeguarding your crypto assets. So, if you're a novice to crypto and still anxious about its safety, here are a few steps you can follow to protect your <a data-toggle="tooltip" data-placement="top"  href="/tags/cryptocurrency" target="_blank" rel="noopener">cryptocurrency</a> investment.</span></p>
<h2>Use Strong Passwords </h2>
<p><span style="font-weight: 400;">One simple way to safeguard your investments is by using strong passwords to protect your wallet and crypto-related accounts. Typically, cybercriminals use different devices to render stolen passwords, so the more difficult and longer your password is, the harder it is to crack.  </span></p>
<p><span style="font-weight: 400;">It's also essential to keep following the password best habits in mind:  </span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">A steady password will contain a long, complicated string of characters, so it's harder to crack. For instance, a secured password must contain at least 12 characters, with a generous string of numbers, symbols (most common ones are %$! #&amp;), lowercase and uppercase letters.  </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Avoid using repetitive passwords for different accounts across multiple platforms. This will make you susceptible to a brute-force attack, especially if the password has been revealed in a previous data breach. </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Make sure you log out of your account whenever you're done with a transaction. In doing so, you will avoid hackers trying to hack your account (particularly on public WIFI networks) by stealing your session cookies. </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">You can also use a password manager, so you won't have to type it out every time or forget it. </span></li>
</ul>
<h2>Consider Two-Factor Authentication (2FA) </h2>
<p><span style="font-weight: 400;">Two-step verification is usually added to a variety of digital processes as an extra layer of security. Basically, with two-step authentication, you can only access an app or a website after you've passed multiple security checks. </span></p>
<p><span style="font-weight: 400;">Therefore, aside from your typical password, the website may ask you to input a secret code sent to you either through SMS, email or push notification. These verification features usually expire after some time, making it difficult for a hacker to use past codes to access your account. </span></p>
<p><span style="font-weight: 400;">Every cryptocurrency exchange supports two-factor authentication to better secure your account. Some offer simple SMS and email verification while others take it a step further with 2FA websites and apps like Google Authenticator. </span></p>
<h2>Secure Your Crypto Wallet </h2>
<p><span style="font-weight: 400;">The safety of your investments also depends on the type of wallet you use. Usually, you can choose between a non-custodial and custodial wallet for storing your coins.  </span></p>
<p><span style="font-weight: 400;">A custodial wallet is a digital wallet operated by third parties (typically </span><a data-toggle="tooltip" data-placement="top"  href="https://fx-list.com/crypto-forex-brokers-metatrader-5" target="_blank" rel="noopener" data-toggle="tooltip" data-placement="top"><span style="font-weight: 400;">MT5 cryptocurrency brokers</span></a><span style="font-weight: 400;"> and exchanges) who help secure your crypto holdings and hold your private keys. Even digital wallets are a user-friendly option to store your assets, that's still a bad idea for storing your crypto long term. And here is why: </span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Custodial digital wallets are centralized, which makes them not very much different from banks since they have control over your assets. </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">You won't have access to your private key, which you will always need the wallet provider to grant access to your own money. </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Your wallet could get breached, leaving you with the possibility of losing your cryptocurrencies. </span></li>
</ul>
<p><span style="font-weight: 400;">On the other hand, a non-custodial wallet is decentralized since you're the sole custodian of your private keys. They will allow you full control of your cryptocurrencies and nobody can access your money without your permission. </span></p>
<h2>Always Use Cold Storage </h2>
<p><span style="font-weight: 400;">Cold storages are basically electronic devices meant to specifically secure your crypto offline. </span></p>
<p><span style="font-weight: 400;">With a cold storage device, you can only process a transaction when it's linked to your smartphone or computer. Cold wallets are way more costly than hot wallets, however, if you can afford it, you will sleep like a baby knowing your funds are safe. </span></p>
<h2>Multi-signature wallets </h2>
<p><span style="font-weight: 400;">Multisig wallets are likely the intersection of non-custodial and custodial wallets. Each copy payer requires a private key for accessing the wallet but needs other copypayers keys to approve transactions from the wallet. </span></p>
<p><span style="font-weight: 400;">Basically, Multisig wallets need two or more private keys to be provided at the same time before any money can be accessed or uploaded. Without the necessary number of keys, no one can perform transactions using the wallet. </span></p>
<h2>Lose your Keys, Lose Your Crypto<strong> </strong></h2>
<p><span style="font-weight: 400;">Private keys are imperative when it comes to your cryptocurrency's safety. A private key contains a string of numbers that represents the cryptocurrency in your wallet. </span></p>
<p><span style="font-weight: 400;">Your private keys will primarily prove ownership of cryptocurrency assets on a specific blockchain address and allow you access to your funds. </span></p>
<p><span style="font-weight: 400;">Not to mention that, if it falls into the wrong hands, bad actors can have full access to your funds. As for your wallet security, the rule of thumb is, you don't own your fund if your private isn't in your possession. </span></p>
<p><span style="font-weight: 400;">Since the value of private keys is obvious, it is important that you </span><a data-toggle="tooltip" data-placement="top"  href="https://www.bitcoin.com/get-started/how-to-import-and-export-bitcoin-private-keys/" data-toggle="tooltip" data-placement="top"><span style="font-weight: 400;">backup your private keys</span></a><span style="font-weight: 400;">. But if you didn't back up your private keys and lose your wallet, you can quickly retrieve it by using a mnemonic phrase. A mnemonic phrase can be a user-friendly option for restoring your wallet, but you might still have to write it right. </span></p>
<h5><span style="font-weight: 400;">Featured image from Unsplash.com</span></h5>]]></content:encoded>
  	    <media:content url="https://kenkarlo.com/assets/images/article/141205-new-to-crypto.jpg?fit=scale" medium="image">
        <media:thumbnail url="https://kenkarlo.com/assets/images/article/141205-new-to-crypto.jpg?fit=scale"/>
        </media:content>
  	</item>
 		<item>
    	<title>3 Crypto And Blockchain Phishing Scams To Be Aware Of Before You Get Excited About Web3</title>
    	<atom:link href="https://kenkarlo.com/articles/3-crypto-blockchain-phishing-scams-aware-before-get-excited-about-web3/feed" rel="self" type="application/rss+xml" />
    	<link>https://kenkarlo.com/articles/3-crypto-blockchain-phishing-scams-aware-before-get-excited-about-web3</link>
    	<dc:creator><![CDATA[Laurel Moore, Contributor]]></dc:creator>
    	<atom:author>
			<atom:name>Laurel Moore, Contributor</atom:name>
			<atom:uri>https://kenkarlo.com/author/laurelmoore</atom:uri>
		</atom:author>
    	<pubDate>Wed, 08 Feb 2023 12:54:53 PST</pubDate>
    	<atom:updated>2023-02-08T12:54:53Z</atom:updated>
    	<guid isPermaLink="false">https://kenkarlo.com/p/502</guid>
    	<category><![CDATA[Avoid scams]]></category>
    	<description>Web3, a blockchain-based decentralized online ecosystem, has become a subject of interest for crypto enthusiasts, tech experts, and more. For example, at the beginning</description>
        <content:encoded><![CDATA[<h2>Everything you need to know about phishing scams on Web3</h2>
<p>Web3, cryptography, blockchain, and NFT, the industry introduced by Satoshi Nakamoto back in 2009, has spawned a trillion-dollar industry that will only grow in the coming years. As money continues to pour into space, so do thieves, hackers, and other nefarious criminals who see an opportunity to take advantage of those with no experience or are blinded by dreams of getting rich. As possibilities pile up, it becomes harder for attackers to deny those opportunities, thus increasing the number of thefts of cryptocurrencies that occur over the years and the total amounts that are generally compromised. </p>
<h2>Some words about Web3 </h2>
<p><a data-toggle="tooltip" data-placement="top"  title="Web3" href="/tags/web3" target="_blank" rel="noopener" data-toggle="tooltip" data-placement="top">Web3</a>, a blockchain-based <a data-toggle="tooltip" data-placement="top"  title="Decentralized" href="/tags/decentralized" target="_blank" rel="noopener" data-toggle="tooltip" data-placement="top">decentralized</a> online ecosystem, has become a subject of interest for crypto enthusiasts, tech experts, and more. For example, at the beginning of 2022, YouTube CEO Susan Wojcicki announced that Web3 represented a «previously unimaginable opportunity to grow the connection between creators and their fans; on the same day, two of her executives announced they were leaving to join … Web3 companies. The early development of applications involving cryptocurrencies and tokens (NFTs) has already been exploited to the advantage of cyber criminals, with $14 billion worth of cryptocurrencies stolen in 2021. Even though blockchain is one of the most secure technologies on the Internet, scammers or threat actors always find a way out by luring targets to click on a malicious link. Before people get excited about Web3, they should first look at some of the successful phishing scams launched recently.</p>
<h2>What is phishing? </h2>
<p>Phishing scams have been around since before the advent of the Internet. Ever since homes had only landline phones, from time to time, a stranger could call home and lure an unsuspecting child into divulging information that could compromise the safety of that child or his family. In the internet age, this scam has evolved into tricking unsuspecting users into clicking on links,</p>
<p>who can then install various forms of malware or ransomware on their devices. Such software, when activated, can do anything from logging keystrokes to controlling a device. In the Web3 world, scammers use links differently – to lure users into divulging information that would allow an attacker to gain access to a user's wallet. Such attacks, if successful, can cause the victim to disclose seed phrases, private keys, and other data, which would give the scammers access to a user's savings. </p>
<p class="read-more">To read more about these schemes, <a data-toggle="tooltip" data-placement="top"  href="/articles/bitmedia-crypto-ad-network-scam-or-legit" target="_blank" rel="noopener" data-toggle="tooltip" data-placement="top">visit here</a>. </p>
<h2>The most famous phishing scams </h2>
<p><amp-img layout="responsive"  src="/assets/images/blog/234127-bitcoin-hackers.webp" alt="most famous phishing scam" width="800" height="500" ></amp-img></p>
<p>Since Web3 relies on blockchain technology, it is inherently secure. But the fact remains that people will always be vulnerable to manipulation, so phishing is one of the top attack vectors. In addition, blockchain allows attackers to remain anonymous, and stolen funds are usually non-refundable. If you want to know more about blockchain technology, you can visit the platform ICOholder. Check it out: <a data-toggle="tooltip" data-placement="top"  href="https://icoholder.com/" target="_blank" rel="noopener" data-toggle="tooltip" data-placement="top">icoholder.com</a>. Let's look at some of the most common cryptocurrency and blockchain phishing scams that recently surfaced. </p>
<h2>Malicious AirDrops </h2>
<p>Airdrops are a marketing, or promotional tool organizations use to encourage users to use their products, services, or platforms. Companies usually drop cryptocurrencies (or money) to a user's wallet address in exchange for an action, such as launching a new product, offering a new coin, promoting a brand, or signing up on social media. Since free money attraction and FOMO (fear of missing out), airdrops have become popular among early crypto investors. </p>
<p>However, airdrops are often used to run phishing campaigns. For example, through a giveaway, users may receive an email, SMS, or social media message about adding some random cryptocurrency to their wallet. The victim then goes to another exchange where she can sell the coin. The website asks victims to connect their wallets only to find out about the withdrawal of all funds. Last year, <a data-toggle="tooltip" data-placement="top"  href="https://www.theverge.com/2022/2/20/22943228/opensea-phishing-hack-smart-contract-bug-stolen-nft" target="_blank" rel="noopener" data-toggle="tooltip" data-placement="top">malicious NFTs sent over the air helped attackers steal hundreds of thousands of dollars</a> worth of collectibles from the OpenSea NFT marketplace.</p>
<h2>Ice phishing </h2>
<p>Like ice fishing in the real world, when a hole is made in a frozen lake to catch fish, ice phishing is a new Web3 clickjacking scheme that tricks users into assigning or delegating custom token endorsement to a cybercriminal. According to Microsoft, the user interface of the intelligent contract is such that it does not become apparent to the victim the transaction was fake. All the attacker must do is change the payer address to the attacker's address and wait for the victim to authorize the transaction by approving the attacker's account. (In the parlance of cryptography, a "spender" is allowed to spend on behalf of the owner.) </p>
<p>In this case, the attacker modified the intelligent contract's user interface by injecting a malicious script into the front end of the smart contract. A similar attack occurred on the BadgerDAO exchange late last year when attackers used ice phishing to steal $120 million worth of cryptocurrencies. </p>
<h2>Fraudulent emails, websites, and social media accounts </h2>
<p>Phishing emails and fake URLs are one of the oldest tricks in the book. Similarly, Web3 is rife with copycat websites, social media accounts, and scam emails. From get-rich-quick schemes to pump-and-dump schemes, fake promotions, and promising new cryptocurrencies, email scams cost users millions of dollars each year. </p>
<p>Last year, a leading cryptocurrency exchange <a data-toggle="tooltip" data-placement="top"  href="https://www.businessinsider.com/hacker-steals-55-million-in-crypto-after-bzx-phishing-attack-2021-11" target="_blank" rel="nofollow noopener" data-toggle="tooltip" data-placement="top">lost $55 million because a cryptocurrency developer opened a phishing email with a malicious attachment</a>. Cryptocurrency-related scams are growing exponentially on social media. Fraudsters often pose as genuine sources, celebrities, friends, or family members, encouraging users to visit fake websites or make fictitious investments. Two-faced developers resort to the famous scam as soon as investments pick up steam, leaving investors with worthless assets. The rug scam cost investors a whopping $2.8 billion in 2021. </p>
<h2>Phishing with a seed phrase </h2>
<p>In addition to the above three options for digital money fraud, it is worth talking about the features of using the seed phrase. </p>
<p>The so-called seed phrase is a master key that opens access to all digital assets. It's like giving someone your bank account username and password. Some phishing scams trick persons into divulging their seed phrase, causing them to lose funds stored in crypto wallets. For example, phishers exploited Google Ads to promote their scam and redirect users to phishing websites or browser extensions that appear legitimate. As a step of the account registration or recovery process, the unsuspecting victim must go through a recovery step provided by the attacker. The perpetrator then uses the exact phrase to empty the victim's wallet immediately. Popular crypto wallet Metamask alerted users to Twitter bots that asked users to enter their seed phrases on Google forms as part of the account recovery process. </p>
<h2>Prospects for crypto crime </h2>
<p>With the increase in the number of new entrants into the cryptocurrency space, the number of users and the money they bring with them will grow significantly in the coming years. While this will be good for the common area, it will also lead to a new wave of scammers and scammers who will constantly find ways to deprive people of their money. As incentives grow, so will the number of scammers and the sophistication of their schemes to trick people into divulging information that allows thieves to access funds. </p>
<p>New market entrants should be aware that the crypto world is very different from the traditional financial institutions that most people are used to dealing with. Banks and other custodians often have government or company-backed guarantees to protect their customers. The consequences of fraudulent charges on credit cards can be offset by card companies, while the bank or the government can insure the theft of bank deposits. </p>
<p>In Web3, all this disappears. On the positive side, people become masters of their money, having complete control over their assets at all times. The downside is that the people involved in such an economy are solely responsible for keeping their funds safe, as there are no third parties involved in this new era of finance. Once the funds leave the crypto wallet, they effectively disappear. Therefore, users must be aware of the types of scams mentioned above. Additionally, users should consider additional layers of security, including implementing a blockchain monitoring solution for their wallets. Such a solution will allow users to perform cryptographic monitoring and inform the wallet's owner of any activity in the wallet. You can quickly implement free blockchain monitoring solutions without technical knowledge. With crypto monitoring, the user instantly receives information when a transaction occurs that they did not authorize. Such knowledge could let the user report such actions immediately and possibly enable enough time to freeze the transaction before the blockchain confirms it. </p>
<h2>Conclusion </h2>
<p>Cryptocurrency is an exciting and transformative space to be a part of. However, users should regularly remember that the area is still in its infancy, and many proposed technologies are still developing. Vulnerabilities exist, and Web3 contributors must remember to always be on the lookout to protect their assets. Awareness of common scams and implementing blockchain monitoring solutions or other lines of defense are critical to keeping funds safe and secure.</p>
<p> </p>]]></content:encoded>
  	    <media:content url="https://kenkarlo.com/assets/images/article/474755-bitcoin-phishing-scams.webp?fit=scale" medium="image">
        <media:thumbnail url="https://kenkarlo.com/assets/images/article/474755-bitcoin-phishing-scams.webp?fit=scale"/>
        </media:content>
  	</item>
 	</channel>
</rss>

