"CYBER"

Risultato della ricerca di

Corsi (0)

Articoli (159)

Glossario (1)

What Are The Features And Functions Of CyberConnect's Social Re-Staking L2 "Cyber"?
Intermediate

What Are The Features And Functions Of CyberConnect's Social Re-Staking L2 "Cyber"?

The transformation into a social re-staking modular L2 is not only a technological leap for Cyber but also a profound exploration and forward-looking layout for the future of social networks. The article explains how Cyber operates and its features, providing a truly decentralized environment. This allows users to expand their influence more fairly and directly, and build closer connections with their fans.
5/27/2024, 10:25:40 AM
Gate Wallet Launches Cyber Crash Airdrop Task – 500 Whitelist Spots Up for Grabs
Beginner

Gate Wallet Launches Cyber Crash Airdrop Task – 500 Whitelist Spots Up for Grabs

Gate Wallet, in collaboration with BountyDrop, has launched the latest Airdrop task: the Cyber Crash Allowlist lottery is officially open. Users can participate in sharing 500 Allowlist qualifications by completing simple interactions through the wallet, gaining first-hand access to Web3 game passes.
6/25/2025, 1:13:39 AM
Gate Wallet launches the Cyber Crash Airdrop task, 500 Allowlist spots waiting for you to share.
Advanced

Gate Wallet launches the Cyber Crash Airdrop task, 500 Allowlist spots waiting for you to share.

Gate Wallet has partnered with BountyDrop to launch the latest Airdrop task: The Cyber Crash Allowlist lottery is officially open. Users can participate in splitting 500 Allowlist spots by completing simple interactions through the wallet, gaining first-hand access to Web3 game passes.
6/25/2025, 1:38:45 AM
What Is a Phishing Attack?
Beginner

What Is a Phishing Attack?

A manipulative form of cyber attack
1/13/2023, 11:27:51 AM
Gate Wallet BountyDrop: Join the Cyber Crash Airdrop and Share 500 Whitelist
Beginner

Gate Wallet BountyDrop: Join the Cyber Crash Airdrop and Share 500 Whitelist

Gate Wallet BountyDrop is a one-stop hub that gathers the most popular airdrop projects, offering users a fast-track entry into interactive tasks. Users can easily browse the latest airdrop projects, view project overviews, the interaction process, participation timeframes, and directly access project pages through task links to participate. Users can enter the BountyDrop platform through Gate Wallet and freely participate in interactive tasks for various projects, increasing the chances of getting airdrop rewards.
6/24/2025, 8:45:45 AM
The Collapse of Web3 Gaming: How Can We Escape the "Cyber Graveyard"?
Intermediate

The Collapse of Web3 Gaming: How Can We Escape the "Cyber Graveyard"?

In 2025, the wave of shutdowns in blockchain games became frequent, with star projects collectively "dying suddenly." This article deeply analyzes why Web3 games frequently fall into funding dilemmas and trust crises, reveals the structural problems behind players' disillusionment, and explores feasible paths for the rebirth of blockchain games.
6/3/2025, 2:53:32 AM
How cybercriminals use YouTube and GitHub to spread crypto malware
Beginner

How cybercriminals use YouTube and GitHub to spread crypto malware

In the ever-evolving landscape of cyber threats, two platforms traditionally viewed as safe spaces for content creation, learning and open-source collaboration have become targets for distributing malware aimed at stealing crypto and personal data — YouTube and GitHub. So, how are cybercriminals using YouTube and GitHub to spread malware and how you can protect yourself?
11/25/2024, 3:44:40 AM
What is CyberConnect
Beginner

What is CyberConnect

CyberConnect is a Web3 social middleware infrastructure that enables any development team to build various social-based applications on its provided middleware. The core product is focused on creating a decentralized social graph. Its infrastructure emphasizes data sovereignty, implementing a user-centric data flow system based on Ceramic and IPFS storage layers.
12/10/2023, 11:09:07 AM
General Security Principles in Blockchain
Beginner

General Security Principles in Blockchain

Blockchain security is a comprehensive risk assessment process carried out for a blockchain network to assure its safety from hacks, data breaches, and fraud.
1/31/2023, 11:14:15 AM
NEST Protocol Quote Mining: The Next-Generation DeFi Oracle Network
Intermediate

NEST Protocol Quote Mining: The Next-Generation DeFi Oracle Network

NEST Protocol is a decentralized Oracle network that uses a unique "quote mining" mechanism to synchronize off-chain data with on-chain data without needing a central authority. NEST Protocol provides efficient and decentralized price information for various applications, including decentralized exchanges, financial derivatives, Metaverse, GameFi, and more, aiming to improve the transparency and reliability of decentralized finance.
8/1/2024, 8:47:56 AM
What Is YubiKey?
Beginner

What Is YubiKey?

YubiKey enables two-factor, multi-factor, and passwordless authentication with a seamless touch-to-sign-in and protects access to multiple devices and services
1/26/2023, 2:21:45 PM
What is PolySwarm? All You Need to Know About NCT
Intermediate

What is PolySwarm? All You Need to Know About NCT

PolySwarm (NCT) is a cybersecurity threat detection and intelligence platform using blockchain technology.
4/27/2024, 5:40:41 AM
What is Lossless? All You Need to Know About LSS
Intermediate

What is Lossless? All You Need to Know About LSS

Lossless (LSS) is a crypto protocol aimed at preventing fraud by enabling the freezing of suspicious transactions.
8/14/2024, 2:52:41 PM
What is Crypto Insurance?
Beginner

What is Crypto Insurance?

This article delves into the necessity of cryptocurrency insurance, analyzing the cybersecurity threats and theft risks faced by the cryptocurrency market, as well as how insurance can provide protection for investors and exchanges. It outlines the definition and coverage of cryptocurrency insurance and explains how it can help mitigate losses caused by scams, hacking, and other illicit activities. The article also lists several well-known cryptocurrency insurance providers, including Kase, CoinCover, EmBrokers, Nexus Mutual, and Athena Ins, discussing how they offer security for digital assets. It emphasizes the importance of adopting additional security measures and expresses optimism about the future development of decentralized insurance protocols.
10/24/2024, 3:14:45 PM
 Paradigm and Lido Supported Symbiotic Re-Staking Protocol
Intermediate

Paradigm and Lido Supported Symbiotic Re-Staking Protocol

Symbiotic is a shared security protocol that acts as a coordination layer, enabling network builders to control and adjust their (re)staking strategies in a permissionless manner. Considering the current re-staking protocol EigenLayer supports only ETH and some ETH derivative staking, while Symbiotic supports staking of any asset following the ERC-20 token standard, the two may become direct competitors.
7/10/2024, 1:30:26 AM

Il tuo accesso al mondo delle criptovalute, iscriviti a Gate per una nuova prospettiva

Il tuo accesso al mondo delle criptovalute, iscriviti a Gate per una nuova prospettiva