"CYBER"

Search result of

Courses (0)

Articles (149)

Glossary (1)

What Are The Features And Functions Of CyberConnect's Social Re-Staking L2 "Cyber"?
Intermediate

What Are The Features And Functions Of CyberConnect's Social Re-Staking L2 "Cyber"?

The transformation into a social re-staking modular L2 is not only a technological leap for Cyber but also a profound exploration and forward-looking layout for the future of social networks. The article explains how Cyber operates and its features, providing a truly decentralized environment. This allows users to expand their influence more fairly and directly, and build closer connections with their fans.
5/27/2024, 10:25:40 AM
What Is a Phishing Attack?
Beginner

What Is a Phishing Attack?

A manipulative form of cyber attack
1/13/2023, 11:27:51 AM
How cybercriminals use YouTube and GitHub to spread crypto malware
Beginner

How cybercriminals use YouTube and GitHub to spread crypto malware

In the ever-evolving landscape of cyber threats, two platforms traditionally viewed as safe spaces for content creation, learning and open-source collaboration have become targets for distributing malware aimed at stealing crypto and personal data — YouTube and GitHub. So, how are cybercriminals using YouTube and GitHub to spread malware and how you can protect yourself?
11/25/2024, 3:44:40 AM
What is CyberConnect
Beginner

What is CyberConnect

CyberConnect is a Web3 social middleware infrastructure that enables any development team to build various social-based applications on its provided middleware. The core product is focused on creating a decentralized social graph. Its infrastructure emphasizes data sovereignty, implementing a user-centric data flow system based on Ceramic and IPFS storage layers.
12/10/2023, 11:09:07 AM
General Security Principles in Blockchain
Beginner

General Security Principles in Blockchain

Blockchain security is a comprehensive risk assessment process carried out for a blockchain network to assure its safety from hacks, data breaches, and fraud.
1/31/2023, 11:14:15 AM
NEST Protocol Quote Mining: The Next-Generation DeFi Oracle Network
Intermediate

NEST Protocol Quote Mining: The Next-Generation DeFi Oracle Network

NEST Protocol is a decentralized Oracle network that uses a unique "quote mining" mechanism to synchronize off-chain data with on-chain data without needing a central authority. NEST Protocol provides efficient and decentralized price information for various applications, including decentralized exchanges, financial derivatives, Metaverse, GameFi, and more, aiming to improve the transparency and reliability of decentralized finance.
8/1/2024, 8:47:56 AM
What Is YubiKey?
Beginner

What Is YubiKey?

YubiKey enables two-factor, multi-factor, and passwordless authentication with a seamless touch-to-sign-in and protects access to multiple devices and services
1/26/2023, 2:21:45 PM
What is PolySwarm? All You Need to Know About NCT
Intermediate

What is PolySwarm? All You Need to Know About NCT

PolySwarm (NCT) is a cybersecurity threat detection and intelligence platform using blockchain technology.
4/27/2024, 5:40:41 AM
What is Lossless? All You Need to Know About LSS
Intermediate

What is Lossless? All You Need to Know About LSS

Lossless (LSS) is a crypto protocol aimed at preventing fraud by enabling the freezing of suspicious transactions.
8/14/2024, 2:52:41 PM
What is Crypto Insurance?
Beginner

What is Crypto Insurance?

This article delves into the necessity of cryptocurrency insurance, analyzing the cybersecurity threats and theft risks faced by the cryptocurrency market, as well as how insurance can provide protection for investors and exchanges. It outlines the definition and coverage of cryptocurrency insurance and explains how it can help mitigate losses caused by scams, hacking, and other illicit activities. The article also lists several well-known cryptocurrency insurance providers, including Kase, CoinCover, EmBrokers, Nexus Mutual, and Athena Ins, discussing how they offer security for digital assets. It emphasizes the importance of adopting additional security measures and expresses optimism about the future development of decentralized insurance protocols.
10/24/2024, 3:14:45 PM
 Paradigm and Lido Supported Symbiotic Re-Staking Protocol
Intermediate

Paradigm and Lido Supported Symbiotic Re-Staking Protocol

Symbiotic is a shared security protocol that acts as a coordination layer, enabling network builders to control and adjust their (re)staking strategies in a permissionless manner. Considering the current re-staking protocol EigenLayer supports only ETH and some ETH derivative staking, while Symbiotic supports staking of any asset following the ERC-20 token standard, the two may become direct competitors.
7/10/2024, 1:30:26 AM
What is Cryptojacking?
Intermediate

What is Cryptojacking?

By understanding what cryptojacking is, recognizing its signs, and taking proactive steps to protect our digital environment, we can thwart these cybercriminals' efforts. In an era where technology is ever-evolving, so too are the threats that accompany it. Staying informed and vigilant is not just a recommendation; it's necessary to ensure that we maintain control over our digital lives.
11/23/2023, 6:44:11 PM
What is BinaryX and How does it Work?
Beginner

What is BinaryX and How does it Work?

Trace BinaryX's journey from the debut of CyberDragon to the latest game releases and innovations like DAO mechanisms, CyberArena, and CyberChess.
9/19/2023, 3:56:52 PM
How does Heurist boost AI Agents' computing power?
Intermediate

How does Heurist boost AI Agents' computing power?

Heurist is a decentralized AI cloud computing protocol offering premium infrastructure for future crypto users and AI developers. Through its DePIN protocol architecture, GPU owners can provide computing resources permissionlessly. Heurist boasts several advantages: enhanced system security via decentralization, cost reduction through idle resource utilization, and improved efficiency with dynamic resource allocation. The platform's key applications include AI NFT creation, AI dialogue, and search capabilities. By developing highly customized Web3 AI models, Heurist propels the growth of blockchain-based AI Agents. With plans to issue tokens in Q4 2024 and roll out various features throughout 2025, Heurist aims to become a crucial link between AI technology and the future.
11/19/2024, 5:54:51 AM
What Are Coin Mixers and How Do They Work?
Beginner

What Are Coin Mixers and How Do They Work?

A coin mixer is a service in the crypto industry that ultimately seeks to anonymize crypto transactions, between users involved in sending and receiving funds.
1/25/2023, 10:33:51 AM

Your Gateway to Crypto World, Subscribe to Gate for A New Perspective

Your Gateway to Crypto World, Subscribe to Gate for A New Perspective