Wallet

Stay updated on crypto wallets and self custody solutions including MetaMask, Trust Wallet, Ledger and other emerging wallets with insights on hardware and software options, seed phrase backup, multi chain storage, wallet security, Web3 integrations and the latest trends shaping digital asset management.
Chỉ mục nổi bật
3 giờ trước
Google flags "Coruna" iPhone exploit kit used by fake crypto sites to steal wallet seed phrases
Google's threat intelligence team reported that a new exploit kit dubbed "Coruna" targets iPhones running iOS 13.0 to 17.2.1 and has been used on fake crypto websites to capture wallet seed phrases. The toolkit, first identified in February 2025, contains multiple iOS exploit chains and was later found on spoofed Chinese financial and exchange sites seeking user funds and sensitive data. Security researchers say the tool may be linked to surveillance customers, while some industry experts dispute claims it originated from US intelligence code.
Đã chọn
3 giờ trước
2 ngày trước
Hackers use "ClickFix" to impersonate VCs and compromise QuickLens Chrome extension
Cybersecurity researchers report that "ClickFix" attacks are now being used by scammers posing as venture capital firms on LinkedIn and by hijacking the QuickLens Chrome extension. The VC-themed campaign lures victims into fake video calls, while the compromised extension was updated with malware after a February 1 ownership change and reached around 7,000 users before removal.
Đã chọn
2 ngày trước
3-1
Social Engineering Scam Uses Fake Microsoft Teams Page to Push Malicious PowerShell Script
According to a first-hand account updated on March 1, 2026, a crypto and Web3 professional narrowly avoided installing malware after joining what appeared to be a routine Microsoft Teams call set up via a familiar Telegram contact and Calendly link. The attackers used a spoofed Teams domain that blocked mobile access, then pressured the target on desktop to run a PowerShell command fetching code from teams.livescalls.com. The incident highlights how compromised industry accounts and realistic meeting interfaces are being weaponized to target high‑value crypto participants and potentially drain wallets or steal credentials.
Đã chọn
3-1