Reports: Crypto Exchanges Had Record Hacks and Bitcoin Custodianship in 2019
January 24, 2020
A new report by a blockchain analytics company alleges that 2019 saw the most exchange hacks ever in the decade-old history of cryptocurrencies
CoolWallet S vs Ledger Nano X: How are Bluetooth Hardware Wallets Different?
September 06, 2019
Bluetooth hardware wallets like CoolWallet S and Ledger Nano X provide the best of both worlds for cryptocurrency owners: superior cold storage and the freedom of access to your crypto anywhere, anytime.
Crypto Dusting Attacks on Litecoin and Bitcoin Wallets: Your Need-To-Know Guide
August 16, 2019
Crypto dusting attacks are becoming more common, recently involving Litecoin and Bitcoin owners. What is it, why does it happen and what is your risk? Our guide explains all.
Stone Cold: 3 Rules To Secure Your Crypto Hardware Wallet’s Recovery Seed
July 24, 2019
You don’t need to be a security expert to protect your virtual assets like Bitcoin, just a quality hardware wallet […]
Best ICON Wallet for ICX coins (2019 Guide)
June 20, 2019
The Best ICON Hardware Wallet- How to keep your ICX Coins Safe The CoolWallet S offers native support for the […]
How to create and Use An Icon (ICX) Wallet on CoolWallet S
June 20, 2019
Since ICON is natively supported on CoolWallet S, there’s already an ICX wallet set up for you, with the private […]
Warning: Ledger Live Announces Phishing Malware
April 28, 2019
Ledger announces Ledger Live users are being targeted by malware, while NSA-developed ransomware is “cryptojacking” Asian company computers.
152,000 Infected Electrum Bitcoin Wallets Now in Botnet – How Safe Are Desktop Wallets?
April 10, 2019
Latest Electrum Bitcoin Wallet phishing scam report claims that the DoS botnet attack is far from done and actually getting worse. This follows last week’s Ledger Live malware phishing attack. Here’s how to stay safe.
J’Accuse…! Ledger Vs Trezor – Who’s Right?
March 21, 2019
Was Ledger right to “badmouth” Trezor and did they follow the correct protocol? Are physical attacks on hardware wallets a legitimate threat?