Glossary

Glossary Terms

Browse our comprehensive Web3 security glossary

Web3

Web3

WWerner VermaakNov 20, 2024

Web3 is the decentralized internet owned by users. Learn how blockchain, crypto, and dApps work, and the security challenges you face.

Web3 Wallet

Web3 Wallet

WWerner VermaakNov 19, 2024

A Web3 wallet stores your private keys and crypto. Learn how wallets work, different types, and how to secure them against hackers.

Social Engineering

Social Engineering

WWerner VermaakNov 18, 2024

Social engineering attacks manipulate you into revealing secrets. Learn to spot psychological tricks and protect your crypto assets.

Web3 Security

Web3 Security

WWerner VermaakNov 17, 2024

Web3 security protects you from hacks and scams. Learn about wallet security, smart contract risks, and how to stay safe in crypto.

Phishing

Phishing

WWerner VermaakNov 16, 2024

Web3 phishing attacks impersonate trusted sites to steal your keys. Learn to spot fake websites and protect your wallet with Kerberus.

Transaction Poisoning

Transaction Poisoning

WWerner VermaakNov 15, 2024

Transaction poisoning tricks you into copying fake addresses. Learn how this scam works and how to verify recipients with Kerberus.

Smart Contract Vulnerability

Smart Contract Vulnerability

WWerner VermaakNov 14, 2024

Smart contract bugs can cause massive crypto losses. Learn about common vulnerabilities and how to check contracts before investing.

ApprovalForAll Exploit

ApprovalForAll Exploit

WWerner VermaakNov 13, 2024

The setApprovalForAll exploit lets scammers steal all your NFTs. Learn how this attack works and how to manage permissions safely.

Rugpull

Rugpull

WWerner VermaakNov 12, 2024

Rugpulls happen when developers steal investor funds. Learn to spot exit scams and protect your investments with our guide.

Private Key

Private Key

WWerner VermaakNov 11, 2024

Your private key controls your crypto. Learn how it works, why it's crucial for security, and how to keep it safe from theft.

Non-Fungible Tokens (NFT)

Non-Fungible Tokens (NFT)

WWerner VermaakNov 10, 2024

NFTs are unique digital assets on the blockchain. Learn how NFTs work, their use cases, and how to protect your collection from theft.

Multisig Wallet

Multisig Wallet

WWerner VermaakNov 9, 2024

Multisig wallets require multiple keys for transactions, offering better security. Learn how they work and when to use them for your crypto assets.

Malicious Approvals

Malicious Approvals

WWerner VermaakNov 8, 2024

Malicious approvals let scammers drain your wallet. Learn to spot dangerous permissions and revoke them to secure your crypto.

Front-End Compromise

Front-End Compromise

WWerner VermaakNov 7, 2024

Attackers hack dApp front-ends to steal your crypto. Learn how front-end compromises happen and how to verify websites with Kerberus.

Flash-Loan Attack

Flash-Loan Attack

WWerner VermaakNov 6, 2024

Flash-loan attacks exploit DeFi protocols for risk-free profit. Learn how these complex attacks work and how to protect your assets.

Fake Airdrop Scam

Fake Airdrop Scam

WWerner VermaakNov 5, 2024

Fake airdrops promise free tokens to steal your crypto. Learn to spot scam campaigns and protect your wallet from malicious claims.

DaaS (Drainer-as-a-Service)

DaaS (Drainer-as-a-Service)

WWerner VermaakNov 4, 2024

Drainer-as-a-Service (DaaS) platforms empower criminals to steal crypto. Understand the threat and protect your wallet from organized scams.

Crypto Wallet Drainer

Crypto Wallet Drainer

WWerner VermaakNov 3, 2024

Wallet drainers steal crypto by tricking you into approving transactions. Learn how they work and how to block them with Kerberus.

Cross-Chain Bridge Vulnerability

Cross-Chain Bridge Vulnerability

WWerner VermaakNov 2, 2024

Cross-chain bridge hacks cause massive crypto losses. Learn how bridge exploits work and how to protect your assets when moving funds.

Address Poisoning

Address Poisoning

WWerner VermaakNov 1, 2024

Address poisoning attacks trick you into sending crypto to scammers. Learn how to spot fake addresses and secure your wallet with Kerberus.