O cenário de fraudes é um lugar volátil. Para entendê-lo, recomendamos começar com uma introdução aos golpes comuns de hoje em dia e um passo a passo de como reagir se você for vítima.
Read up on the different types of crypto scams in play today and how you can avoid falling victim. Build your essential knowledge before going deeper to better understand how to protect your digital assets.
You've fallen victim to a crypto scam — what next? Learn the best response to limit the damage, secure your crypto, and prevent others from being attacked.
Desmascare criminosos de cripto e revele seus golpes à medida que eles acontecem. Aqui, explicaremos como identificar um golpista, como são as contas oficiais de corretoras de cripto e destacaremos a importância de fazer sua própria pesquisa.
Crypto scammers will leave clues of their bad intentions, giving you the chance to react and protect yourself. Understand how fraudsters talk and the channels they typically use.
Don’t be fooled by an attacker posing as your chosen exchange on social media. Find out how to separate a fake account from a legitimate one and sidestep a potential attack.
In crypto, you should never act only on the opinion of others. Do your own research — or DYOR — is the mantra to follow. Find out how to conduct deep research so you can trade safely and effectively.
When it comes to detecting and avoiding crypto scams, you're not entirely alone. Various advanced tools are available to analyze blockchain networks and smart contracts to flag anything suspicious.
Diante das ameaças, há muito que você pode fazer para armazenar seus ativos com segurança e resistir a um ataque. Entenda como suas ações afetam a segurança das suas criptomoedas e as ferramentas essenciais que você pode usar para se manter seguro.
For many, 2FA is the number one priority when securing their assets. Learn how to use 2FA to prevent unauthorized access to your wallet and crypto accounts.
Your wallet is only as safe as you make it. Find out how your actions and interactions in the Web3 space can threaten your assets, and how to stay vigilant.
Scam cases are rising as Web3 grows in adoption. Understanding common onchain scams is the first step to avoiding them.
A mentira é uma tática comum entre os fraudadores, que manipulam as emoções da vítima para ter acesso aos seus ativos. Conheça os métodos sinistros que os malfeitores usam em golpes de romance e relacionamento.
In pig butchering, scammers contact a victim and build a false sense of trust before they strike. Understand why people fall for the scam, the warning signs to look out for, and how to protect yourself.
It's not you, it's your crypto. This confidence trick involves creating a fake romantic relationship with a victim to access sensitive information and assets. How do fraudsters pull on victims’ heartstrings to eventually deceive them?
Online, not everyone’s as they seem. From government officials to crypto exchange representatives, impersonation is a common crypto scam tactic. Understand how to avoid giving up your assets or data to a scammer in disguise.
If you’re not vigilant, your phone could provide a gateway to an attack. It’s called a SIM swap attack, and involves manipulating your mobile carrier to hijack your phone number and control your account’s two-factor authentication.
Phishing attacks involve setting traps (like in fishing) that lure victims into clicking malicious links or accessing fraudulent platforms. Here, data is stolen in various clever ways to gain access to your assets.
É uma triste realidade que, onde quer que haja dinheiro, sempre haverá golpistas tentando roubá-lo. Os golpistas de cripto geralmente usam a promessa de prosperidade ou empregos como fachada para fraudes. Não seja uma vítima, saiba como se proteger.
The idea of a part-time crypto side hustle is appealing, but as the saying goes, if it’s too good to be true, it often is. Still, scammers attempt to lure in victims with seemingly lucrative part-time crypto roles as a means of stealing funds or data.
There’s no such thing as a get-rich-quick scheme, but that doesn’t stop crypto scammers. They’ll attempt to draw in potential victims with the promise of quick riches through ponzi and pyramid schemes, fraudulent ICOs, and more.
The allure of easy money is central to crypto remittance scams, as fraudsters promise bigger returns if victims first share an upfront sum. Impersonation and emotional manipulation are also at play here.
Crypto recovery scams prey on the vulnerabilities of those who've lost access to their assets, and are seeking help getting them back. The fraudster promises to help in return for a fee, but help never arrives.
Para os “degenerados” em cripto, é difícil superar a agitação de um novo projeto promissor. Os golpistas sabem disso e usam projetos falsos como fachada para enganar as vítimas e fazê-las compartilhar fundos ou dados confidenciais, que serão roubados. Enquanto isso, alguns malfeitores encontraram maneiras de manipular projetos legítimos para seu próprio benefício.
Fake airdrops, rug pulls, and pump-and-dump schemes are all common tactics for crypto promotional scams. They involve fraudsters creating seemingly legitimate opportunities to trick victims into handing over their funds or sharing data that’s then used to access assets.
No technology is bulletproof, and scammers will seek out gaps in crypto technology as a route to attack. That includes the TRON wallet multisignature mechanism — a security measure fraudsters attempt to manipulate to access user funds.