Your Crypto Needs A Secure Way To Travel. Here's Why.
Educate yourself about secure bridging methods in this guide.by July 5, 2022Fake “Mining” Scams: a Familiar Foe in a New Disguise
An increasingly common scam uses token approvals to steal tokens whilst suggesting you’re earning yield on themby June 28, 2022MetaMask Launches HackerOne Bounty Program To Sustain Security
The bounty program will allow MetaMask to work with the security community to find vulnerabilities in the wallet and stay ahead of Web3 threats.by June 13, 2022The Seal of Approval: Know What You’re Consenting To With Permissions and Approvals in MetaMask
One of the hallmarks of Web3 is providing users with full control over privacy and how they interact with its platforms. Learn how to manage approvals and permissions in MetaMask.by January 26, 2022Spoofing, Sweepers, and Clipboard Hacks: How To Stay Safe From Scams
Here are the key principles for protecting your crypto.by January 13, 2022What’s In A Self-Custody (Non-Custodial) Wallet, Anyway?
This is the first installment in a series of posts designed to explain the world of Web3 and orient users as to how to use Web3 dapps — safely. We’ll be covering topics ranging from the technical to the humorous. Follow along and you’ll be a savvy, safe MetaMask power user in no time.by November 4, 2021The Importance of a Multi-Layered Smart Contract Security Strategy
As a smart contract developer, you want to minimize risk and maximize productivity. Using these layers will minimize your risk of being hacked from the beginning of your smart contract development by identifying and solving issues as soon as they are detected.by September 30, 2021Why Keeping Secrets Is Essential For Web3
The funds in your crypto wallet are like cash. Don't share your Secret Recovery Phrase with anyone, ever.by June 10, 2021