Author

Topic: Some possible ways to avoid phishing attacks and scams (Read 470 times)

hero member
Activity: 2520
Merit: 783
Simple methods are.

Don't read any unwanted emails.

Use dummy email for any registration you made to avoid receiving spam emails on your main email.

Always use dummy wallet on any platform you register when they ask you to provide so that you can avoid any background checking by hackers and became a target on their attacks.

Always ask the community on anything you don't understand because it can save your money and time since you provably get a good answer from true people in this community.


This is what we should remember and for sure we can avoid those attempt made by crazy criminals.
sr. member
Activity: 812
Merit: 315
Vave.com - Crypto Casino
Having one thing is like having nothing, if you really want to beat phishing attacks and scams online you have to always have two devices, if you have a smartphone get an extra one and make sure you use one for everything you are doing online and the second one for everything crypto-related things, that means there will be limited browsing on that phone.

If you also have a PC, I advise you to learn how to run two OS on the PC, it is possible to do this, you can run Linux OS and Windows OS only on the PC, you just have to choose between the two that you want to use at a particular time.

You can use the Linux OS to store your Bitcoin wallet and stuff and use the normal Windows OS for browsing and airdrops.
hero member
Activity: 3024
Merit: 745
Top Crypto Casino
Anytime.

I will try my possible best to make sure I secured my device because I know it's very hard on me to get another device and if this could be the case I will give myself a target to get a new smartphone then the old device would be mainly for 2fa only.
Now that you're aware of it, you can do it and you have to set your goal in order for you to have another smartphone. If you can't avail it for now, you have to be careful with your device and make it sure that no one will steal it from you if you're doing most of your transactions there.
Even it's not a new one but if it's a secondhand, also check it out and much better to do some reformatting on it  but as always advice, to have no headaches with these, brand new is the better choice.
legendary
Activity: 1708
Merit: 1280
Top Crypto Casino
Tons of attacks right now in the internet it could be a form of email through spamming and pretending to be a reliable and legitimate website related on the banks, and other social media platforms once you click a button or link that could be direct into another website that could possible makes an attack or injection to your device, another form is the SMS and Calls this could be spamming the victims pretending one of the agent related to the platform you are using. Better to invest in the security or safety of your device first so it could block suspicious programs. Related into crypto if you have a budget why not take a cold wallet to make sure that you have the keys even hot wallet right now can hack.
legendary
Activity: 1456
Merit: 1108
Top-tier crypto casino and sportsbook
Downloading of wrong software on your devices: Most software, if not obtained from illegitimate places, has security dangers such as malware, which easily exposes the user's information to risk. If the malware is connected to any of the user's wallets, it will take the user's important details and begin sending phishing links and messages to the user. It may even steal the user's funds.
To avoid phishing, it is best to always download software from its official website.
If you do not use a personal computer, do not make the mistake of thinking that this discussion is not relevant to you. If you use a separate mobile device to store your bitcoins, you also do not need to ask anyone no matter the relationship you have with them to send you any applications from their own mobile phone even if they have what you need.

Download every application you need on that mobile phone for storing bitcoins from a trusted source.
legendary
Activity: 2310
Merit: 4085
Farewell o_e_l_e_o
usually i have a Personal Computer that I use currently so it won't be of that bad to me, but most at times i often use my smartphone reply some comments over here.
From what you said so far, I will logout my mail from Smartphone to safeguard my fund since my phone can get stolen anytime.
It is a good prevention but always remember that you should never store all eggs in one bag. Eggs in this context is your coins, tokens. Don't store all of them in one wallet and on one device.

Especially if you use that device to connect to Internet and do many things which might expose your computer to virus, malwares, trojans and so on.

A biggest part of your capital should be stored offline, in an airgap device, cold wallet or hardrware wallet.
legendary
Activity: 1932
Merit: 2354
The Alliance Of Bitcointalk Translators - ENG>SPA
Common sense, I think this is one of the simplest way to used. I mean you just have to used it, sound judgement and it will take and make you safe. If you download softwares from fake and let's say torrent sites, so don't expect that it will be free from malwares. If you can buy expensive laptops and crypto hardware wallets then why look for free softwares in the market?

And then links, links links, whoever the source is, don't just click it. Again, used your judgement whether to trust the source itself. So think before you click.

When first entering this crypto "world" everybody should be well aware that chances are he will lose some money because of phishing, virus, hacking/exit scamming from third party custodial wallets, or lost access to one's own keys or device.

Common sense can make these losses bearable and make the lesson worth the money lost. But if some newbies are willing to go all-in before they learn, or trust all the money they have to invest to the first source with legitimate appearance they find, we'll keep reading tragedies day after day.
hero member
Activity: 2870
Merit: 594
Common sense, I think this is one of the simplest way to used. I mean you just have to used it, sound judgement and it will take and make you safe. If you download softwares from fake and let's say torrent sites, so don't expect that it will be free from malwares. If you can buy expensive laptops and crypto hardware wallets then why look for free softwares in the market?

And then links, links links, whoever the source is, don't just click it. Again, used your judgement whether to trust the source itself. So think before you click.
full member
Activity: 162
Merit: 104
What about those who do not have a second device to store their 2FA, does it mean they can't use same device install their 2fa?
They can but if they can have a second device for 2FA, it's better. My post is a reminder for people who can have two devices but carelessly login all things in only one device, including 2FA. Like if you have a computer, you can login your email, exchange account on it, and 2FA will be on your smartphone.

Imagine, if your computer is compromised, your fund won't be stolen because 2FA is on your phone which is not connected to your computer.
Same for if you lose your smart phone, nobody can steal your fund with only 2FA on that device.

Quote
Please I am only asking to know because I am planning of getting it installed in my phone but reading this gets me paused because I do only have a single device which is my smartphone and I don't have any money to further get another device.
Just don't login your email on your phone. Only login your email if you want to withdraw your fund from exchanges.

Let me explain it
  • Usually exchange will ask for confirmation codes in 2FA and email when you submit a withdrawal request.
  • If you don't login your email on that phone, you won't lose your fund even that smartphone is lost.

Always backup your 2FA code. You will need that code to recover your 2FA later.

Okay thank you i got your explanation clearly and i have leaned some great today.
usually i have a Personal Computer that I use currently so it won't be of that bad to me, but most at times i often use my smartphone reply some comments over here.
From what you said so far, I will logout my mail from Smartphone to safeguard my fund since my phone can get stolen anytime.
legendary
Activity: 2310
Merit: 4085
Farewell o_e_l_e_o
What about those who do not have a second device to store their 2FA, does it mean they can't use same device install their 2fa?
They can but if they can have a second device for 2FA, it's better. My post is a reminder for people who can have two devices but carelessly login all things in only one device, including 2FA. Like if you have a computer, you can login your email, exchange account on it, and 2FA will be on your smartphone.

Imagine, if your computer is compromised, your fund won't be stolen because 2FA is on your phone which is not connected to your computer.
Same for if you lose your smart phone, nobody can steal your fund with only 2FA on that device.

Quote
Please I am only asking to know because I am planning of getting it installed in my phone but reading this gets me paused because I do only have a single device which is my smartphone and I don't have any money to further get another device.
Just don't login your email on your phone. Only login your email if you want to withdraw your fund from exchanges.

Let me explain it
  • Usually exchange will ask for confirmation codes in 2FA and email when you submit a withdrawal request.
  • If you don't login your email on that phone, you won't lose your fund even that smartphone is lost.

Always backup your 2FA code. You will need that code to recover your 2FA later.
sr. member
Activity: 1288
Merit: 305
yes
Utilize two-factor authentication
When you use Two-factor Authentication (2FA), you must store the 2FA on a second device of yours. It should be a different device than a first device that is used to login your exchange account or email account - that is used to register your exchange account.

If you log in your email, your exchange account on a same device you install your 2FA, it is a bad practice and break protection of 2FA. If you lose that device access, you will lose all (email, exchange account, 2FA and coins). You can not hope that the exchange will detect suspicious activities on your account and temporary lock it or reject withdrawal request. Exchange might trigger it or not, you can not control.

Not a terrible idea, but unless the second device is kept in a safe vault and is only used to receive codes, no practice is safer if you lose the second device that has your 2FA installed, you are still going to lose access. I like the Facebook 2FA code generator since it generates a random master code that may be used if your 2FA device is lost. The codes act as a secret phrase and must be saved in a secure offline location. I'm curious as to why exchanges haven't implemented that yet.
jr. member
Activity: 50
Merit: 8
I like you tried to aware us for this kind of danger, but men, you points are from the 2005. If you are in the internet adn doesnt know that thinks..... well you were very lucky if you not lose something until now.

I repeat thanks for your efforts, but i think we have to level up the discussion, more in a"technical" forum like this.
full member
Activity: 162
Merit: 104
Before downloading a wallet, make sure that it's from the official website. Don't use google search on it because you'll be led to the phishing websites that uses SEO and as well as advertisement through Google ads.

Sorry to ask you this sir/ma
What about those who do not have a second device to store their 2FA, does it mean they can't use same device install their 2fa?
That defeats the purpose of having 2FA if it's stored on the same device because if someone steals your laptop or any device where you're accessing your wallet then the 2FA app is also there, then it will be easily accessed by the intruder or robber.

Please I am only asking to know because I am planning of getting it installed in my phone but reading this gets me paused because I do only have a single device which is my smartphone and I don't have any money to further get another device.
I know that it's kind of tough on your situation but that's how you deal with it. If you have no other device and you have the 2FA on your only one phone where you're accessing everything, you truly have to take care of it. You'll only get hacked if someone steals it from you.

Thank you so much, I will try my possible best to make sure I secured my device because I know it's very hard on me to get another device and if this could be the case I will give myself a target to get a new smartphone then the old device would be mainly for 2fa only.
hero member
Activity: 3024
Merit: 745
Top Crypto Casino
Before downloading a wallet, make sure that it's from the official website. Don't use google search on it because you'll be led to the phishing websites that uses SEO and as well as advertisement through Google ads.

Sorry to ask you this sir/ma
What about those who do not have a second device to store their 2FA, does it mean they can't use same device install their 2fa?
That defeats the purpose of having 2FA if it's stored on the same device because if someone steals your laptop or any device where you're accessing your wallet then the 2FA app is also there, then it will be easily accessed by the intruder or robber.

Please I am only asking to know because I am planning of getting it installed in my phone but reading this gets me paused because I do only have a single device which is my smartphone and I don't have any money to further get another device.
I know that it's kind of tough on your situation but that's how you deal with it. If you have no other device and you have the 2FA on your only one phone where you're accessing everything, you truly have to take care of it. You'll only get hacked if someone steals it from you.
hero member
Activity: 1778
Merit: 709
[Nope]No hype delivers more than hope
I'd add:
Utilize two-factor authentication
There are some pretty sophisticated phisisng sites active around the clock that respond by "forwarding" input every now and then to the original site. I don't really remember where I read it, but I'm sure it exists.

-snip-
Stay updated and patch your software
Verify website authenticity
You probably sorted it wrong, First should be "verify website authenticity". Updating software is a waste if you actually downloaded it from the wrong site in the first place.
full member
Activity: 162
Merit: 104
Utilize two-factor authentication
When you use Two-factor Authentication (2FA), you must store the 2FA on a second device of yours. It should be a different device than a first device that is used to login your exchange account or email account - that is used to register your exchange account.

If you log in your email, your exchange account on a same device you install your 2FA, it is a bad practice and break protection of 2FA. If you lose that device access, you will lose all (email, exchange account, 2FA and coins). You can not hope that the exchange will detect suspicious activities on your account and temporary lock it or reject withdrawal request. Exchange might trigger it or not, you can not control.

Sorry to ask you this sir/ma
What about those who do not have a second device to store their 2FA, does it mean they can't use same device install their 2fa?
Please I am only asking to know because I am planning of getting it installed in my phone but reading this gets me paused because I do only have a single device which is my smartphone and I don't have any money to further get another device.
legendary
Activity: 2310
Merit: 4085
Farewell o_e_l_e_o
Utilize two-factor authentication
When you use Two-factor Authentication (2FA), you must store the 2FA on a second device of yours. It should be a different device than a first device that is used to login your exchange account or email account - that is used to register your exchange account.

If you log in your email, your exchange account on a same device you install your 2FA, it is a bad practice and break protection of 2FA. If you lose that device access, you will lose all (email, exchange account, 2FA and coins). You can not hope that the exchange will detect suspicious activities on your account and temporary lock it or reject withdrawal request. Exchange might trigger it or not, you can not control.
sr. member
Activity: 588
Merit: 289

By the way OP your post seems like Ai generated, and writing with AI does not look good on this forum.
You can verify it if there is a way to do so.
This is not an AI-generated article; rather, it is an effort on my part to educate my fellow forum users.



The bitcoin network is made already private for us to independently make use the the p2p network without going through any third party interference, but most users lack the understanding that they can be able to achieve this all alone, when we take the security and privacy of our bitcoin very well, no one will be able to intrude us not to talk of attacking our asset or investment, these are few safety control measures we should ensure to give cognitive attention.
The purpose of this post is to provide advice on how to avoid phishing to other newbies. Some users have offered additional tips because mine were limited in scope and I learned from the responses I received.
I haven't mentioned the Bitcoin network or privacy at all; all I've said is to stay away from downloading Bitcoin wallet from any source other than their official platforms to avoid malware and fraud.

newbie
Activity: 5
Merit: 1
I'd add:
Utilize two-factor authentication
Stay updated and patch your software
Verify website authenticity
hero member
Activity: 714
Merit: 521
Public display of important emails
Downloading of wrong software on your devices
Downloading of wrong wallets
Interacting with the fake Dexes

The bitcoin network is made already private for us to independently make use the the p2p network without going through any third party interference, but most users lack the understanding that they can be able to achieve this all alone, when we take the security and privacy of our bitcoin very well, no one will be able to intrude us not to talk of attacking our asset or investment, these are few safety control measures we should ensure to give cognitive attention.

Use of cold storage wallet for your bitcoin
Keep your keys and seed phrase away from anyone
Don't leave your private informations opened online
Avoid unnecessary downloads from the internet
Avoid clicking links you're not intended at
Don't join any unfamiliar social media group/page
full member
Activity: 756
Merit: 133
- hello doctor who box
If you are aware of what you are doing you can avoid phishing attacks. People made wrong while using internet, they click on things which they should not, they download malware on their devices from unauthorized websites. Always try to avoid downloading crack or unauthorized software on your computer and don't click any link you see.

By the way OP your post seems like Ai generated, and writing with AI does not look good on this forum.
full member
Activity: 434
Merit: 141
Hire Bitcointalk Camp. Manager @ r7promotions.com
[Guide] Protect your Crypto: Security tips for your home computer & network
Privacy at risk using mobile phones. Not only Bitcoin-related.
Keep your crypto SAFU
Punycode and how to protect yourself from Homograph Phishing attacks?

After all you can test your knowledge with [LEARN & EARN] Phishing Quizzes - Beginners & Experts

Downloading of wrong software on your devices
If it is a device you use to store your cryptocurrency, to trade on exchanges, limit yourself about number of applications, softwares you install on it.

Quote
Downloading of wrong wallets
Download wallet from an official website is good but not enough. You must learn to verify GPG signatures.
sr. member
Activity: 588
Merit: 289
According to my limited knowledge and understanding of phishing, it is a method used by scammers and fraudsters to bridge and obtain people's personal information on websites, social media platforms, emails, wallets, fake exchanges, etc. This is accomplished by sending phishing messages or links to cloned websites, social media platforms, and wallets in order to steal users' personal information and coins.
People have lost enough assets and funds to scammers as a result of their lack of awareness about what and how phishing looks like.

This thread will talk about some possible ways of avoiding phishing attacks.

Public display of important emails
Downloading of wrong software on your devices
Downloading of wrong wallets
Interacting with the fake Dexes

Public display of important Emails: Scammers use email addresses to send phishing links to users; if the user's important emails are not exposed in the same way that forum emails are programmed to be hidden, it will be difficult for scammers to send phishing links to the user because they cannot easily access or compromise the email unless the user wants it exposed, which in this case can lead to a compromise of your forum account, and scammers can use it to send some phishing links.

Downloading of wrong software on your devices: Most software, if not obtained from illegitimate places, has security dangers such as malware, which easily exposes the user's information to risk. If the malware is connected to any of the user's wallets, it will take the user's important details and begin sending phishing links and messages to the user. It may even steal the user's funds.
To avoid phishing, it is best to always download software from its official website.

Downloading of wrong wallets: Scammers take their time to clone similar wallets that look exactly the same as the original wallet; some newbies do unknowingly go ahead and download some of these fake wallets, which always results in the theft of the user's Bitcoin, the installation of malware in the user's device, and exposure to phishing attacks.
Using their official websites to download wallets will solve this problem and limit the number of wallet hacks caused by malware and phishing assaults.

Interacting with the fake Dexes: Decentralized exchanges have dominated the crypto and there have been growth in the good ones and the fake ones, the fake ones are known for stealing coins and private keys when you interact with them, they can go to the length of sweeping your entire wallet and also have access to your private keys without your knowledge, it is very important to use the reputable ones so you don't lose your private keys and money to the wrong people.

These are some of the phishing that is popular in crypto when it comes to phishing attacks on how scammers try to intrude on people's wallets and personal information, stay safe, and don't fall for these cheap scams.
Jump to: