ZenGo token vulnerability fix resolves the DeFi dapp vulnerability in some crypto wallets. The loophole gave hackers access to user funds in crypto wallets, including Opera, TrustWallet, and imToken. ZenGo […]
Dapps have a dirty secret: they can often access an unlimited number of tokens from your wallet. Sounds crazy, but that’s the reality behind the innocuous sounding ERC20 Approve method.
Mainstream users’ gateway to the decentralized ecosystem via Google, Facebook or other OAuth logins. You are 1 click away from your simple, secure and seamless wallet.
With the onset of COVID-19, many businesses are suffering. Funds have dried up as people stop going out and buy less goods and services.
Atomic, is a non-custodial multi-asset wallet that supports over 40 blockchains with 300+ custom tokens. It offers an option to buy crypto with a bank card in 18 local fiat currencies, instant exchange of 60+ assets, supported by Changelly and Change…
While we often lump different ways to store Ethereum assets into the single term “wallet”, there are in fact vast differences in many of…
Decentralized protection for your tokens. Get tokens to your reserve wallet.
The Status Wallet is an open source, non-custodial, cryptocurrency wallet which supports all ERC20 tokens, whilst also supporting ERC721 (collectibles & NFTs).
In the last few years, steel-crafted wallets that store crypto keys on a hard piece of metal have become increasingly popular.
Nobody’s secret the amount of forever lost cryptocurrency increases daily. The problem of losing private keys overtakes every very careful…
Eidoo, a cryptocurrency solutions provider, has begun the rollout of eidooPAY a new system that links a debit card to the Eidoo cryptocurrency wallet.
The first time I laid eyes on a cold blockchain wallet, I was stunned. It wasn’t just the novelty of blockchain technology that shocked me, but the inherent vulnerabilities of wallets currently on the market. Where others saw secure pieces of equipment capable of safely storing millions of dollars in digital assets, I saw HSM formats, USB, ethernet cables, QR codes, and SD cards. In other words, I saw weak points that hackers could use to penetrate the wallets’ defenses, including WI-FI and bluetooth connections that made the notion of “air-gapped” computers laughable.