Securing Crypto: How not to lose money to a hacker
Have you ever read the news about cryptocurrency being stolen? Or some online wallet being hacked? Unfortunately cyber crime is not a topic from sci-fi books anymore. Many individuals have fallen victim to scams and phishing attacks where they unknowingly give away their passwords, private keys or send their cryptocurrencies to fraudulent addresses. Unfortunately these scams can lead to significant financial losses and there’s no way to return the money back.
Is Noones secure? Is my account safe? How do I avoid being hacked? Is this even possible to stay safe? The good news is: it’s quite easy to protect yourself. Just follow a few simple steps to protect yourself.
Step one. Strong password.
Using a strong password is crucial for your online security.
What is a good password?
- Long. Try using a password at least 8 characters long
- Contains letters and numbers. You can even use characters such as dashes (-), commas (,) or dots (.)
- Unique. Using the same password for all your online accounts is really bad idea.
But why does it matter? First of all, hackers use various techniques to crack passwords. Longer passwords are generally harder to guess or crack. A unique password, one that you don’t use on multiple sites, ensures that even if one of your accounts is compromised, your other accounts remain safe. Cybercriminals often try login credentials obtained from one breach on various sites, a technique called “credential stuffing.” Using unique passwords for each site prevents this risk.
Remember, cybersecurity experts and organizations recommend using long, unique passwords for good reason. It’s a fundamental best practice in online security.
But how do I remember so many long passwords? Should I write them down? Managing long and unique passwords for all your accounts can be challenging, but password managers can help. These tools generate, store, and autofill strong passwords for you, making it convenient to maintain good password hygiene. There are many password managers to choose from, and probably the easiest option is to use a password manager built into your browser. Google Chrome and Apple Safari (the most popular browsers among Noones users) both have them.
Step two. 2FA
2FA, or Two Factor Authentication is a technology that protects the most critical parts of online services. For example, accessing cryptocurrency sendouts. It’s like having a safe in your house to make sure only the right person can access your most expensive belongings.
Here’s how it works. You start by entering your email and password (that’s how you enter the house). Then, you need to provide something else, like a code sent to your phone, email or a special app on your mobile phone (that’s the lock on your safe). This proves you have something only you should have.
So, with 2FA, even if someone figures out your password, they still can’t get in because they don’t have that second thing – like your phone or email. It makes your Noones account much more secure.
We recommend enabling 2FA for all accounts, and it’s highly recommended if you hold crypto currency in your Noones Wallet (by the way, Noones recommends self-custody). In order to enable 2FA, log in to your account and go to Settings – Security.
Step three. Software updates
But how do the hackers even hack? Well, some of them use breaches in the security of your computers and phones. Think of these as “holes” that bad guys can use to get into your computer or phone.
We recommend making sure you only use your own devices to log in to your Noones account and that those devices get all the latest software updates.
By installing updates, you’re making sure your computer and phone stay safe, work well, and stay up-to-date with the latest technology. It’s like keeping your devices healthy and happy!
Step four. Safe browsing
Even if your device is up to date and your password is strong, it won’t help if you tell your password to a hacker yourself! But why would someone do that? Well, sometimes you don’t know you are talking to a hacker!
If a police officer stops you outside, how do you know they are a police officer? Usually you can tell from their uniform, their car, a document they may present etc. It’s the same with the websites: you should always be careful and make the basic checks to make sure you are not browsing a bad website.
Cyber criminals create fake websites (also called phishing websites) that look like real ones, like your bank, email, or social media sites. Unfortunately there are a number of websites that look like Noones too. Their goal is to trick you into revealing your personal information, such as your password or 2FA code.
Here’s how to recognize and protect yourself from phishing websites:
- Check the URL: Look at the web address (URL) in your browser’s address bar. Be careful if it looks slightly different from the real site. Sometimes, they use misspelled or slightly altered addresses to fool you. For example, a website may say ‘nooness.com’ or ‘noones.io’. Remember – the only legitimate website is ‘noones.com’
- Look for HTTPS: Legitimate websites use “https://” at the beginning of their URLs. Check for the padlock symbol in the address bar, indicating a secure connection. Be cautious if it’s missing.
- Avoid Clicking Suspicious Links: Don’t click on links in emails, messages, or pop-ups, especially if they ask for sensitive information. Instead, open a new browser tab and manually type in ‘noones.com’.
- Verify the Source: If you receive an email or message asking for personal information, verify its authenticity. Noones never asks you to share your personal details via email. If you are not sure – feel free to contact Noones Support.
- Beware of Urgency and Threats: Phishing sites often create a sense of urgency or use threats to pressure you into taking immediate action. Be skeptical of such tactics.
- Report Suspicious Sites: If you come across a website that impersonates Noones, report it to the appropriate authorities. There are also services that you can report such websites to, this can help prevent others from falling into the trap. One of such services is Google Phishing Page Report.
Remember that being cautious and double-checking before sharing personal information online is your best defense against phishing websites. If something seems off or too good to be true, it’s better to be safe and investigate further.
Step five. Education
Congratulations, you learned a lot about cyber crimes and how to prevent them! Don’t stop here. Educate yourself: learn about other tactics of the scammers and stay informed about the latest scams. Awareness is a powerful defence!