{"id":264538,"date":"2023-07-21T12:08:35","date_gmt":"2023-07-21T09:08:35","guid":{"rendered":"https:\/\/shop.thekernel.ua\/how-to-protect-yourself-from-phishing-with-yubikey-on-binance"},"modified":"2024-09-17T14:36:50","modified_gmt":"2024-09-17T11:36:50","slug":"how-to-protect-yourself-from-phishing-with-yubikey-on-binance","status":"publish","type":"post","link":"https:\/\/shop.thekernel.ua\/en\/how-to-protect-yourself-from-phishing-with-yubikey-on-binance","title":{"rendered":"How to protect yourself from phishing with YubiKey on Binance"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">Binance is one of the largest and most popular cryptocurrency exchanges in the world. With its help, you can monitor the movements of the cryptocurrency market, invest in digital assets and conduct trading operations in real time. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Of course, in order to use the platform effectively, you must first protect your accounts and wallets from potential attackers. Because the more popular the industry becomes, the more cryptocurrency fraudsters appear, who constantly develop new ways to deceive users of the exchange.<\/span><\/p>\n<h2><b>How attackers can gain access to wallets<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Common methods of attackers&#8217; attacks are:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Impersonating Binance employees.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Sending fake messages from law enforcement agencies. <\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Phishing attacks. <\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">You should always be on the alert and be wary of any unusual messages that you did not expect to receive. <\/span><\/p>\n<h3><b>How to recognize intruders who pretend to be employees<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The first thing to remember is that employees of any company will never ask for personal information or try to contact you through unofficial channels. To communicate with Binance staff <\/span><a href=\"https:\/\/www.binance.com\/ru\/chat\"><span style=\"font-weight: 400;\">provided chat<\/span><\/a><span style=\"font-weight: 400;\">. Even if communication through messengers or mail is intended, you will be warned about it through official messages in your account. In any case, upon receiving a suspicious message, it is better to immediately write to the company&#8217;s support by logging in to the Binance website.<\/span><\/p>\n<h3><b>How to recognize fake messages from &#8220;law enforcement officers&#8221;<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Usually, fraudsters pretending to be law enforcement officers try to get you to do something quickly and without thinking by threatening to block your account. For example, they may say that funds came into your account from suspicious sources, so a money laundering investigation has begun. Then, under this pretext, they can request your confidential data, or ask to transfer some amount of funds to supposedly confirm your identity or hide all the money &#8220;in a more reliable wallet&#8221;.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In fact, law enforcement officials will not contact you by mail or call you about this, nor will they ask for passwords or PINs. Do not respond to such messages, rather check the official messages from the company immediately or contact Binance support to make sure that your wallets have not been seized.<\/span><\/p>\n<h3><b>What are phishing attacks and how to protect against them<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Phishing attacks or phishing are one of the means of influence by attackers using social engineering. The main goal of scammers is to obtain sensitive information: full username, password, two-factor authentication code, PIN, etc. In order to obtain this data, an attacker can impersonate another person or send fake \u2013 fake official \u2013 forms to fill out and malware. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Examples of phishing attacks:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">application from an address that is similar to the address of the official website (may differ by 1 or more characters);<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">a link to a fake site (the address of which may also be slightly different);<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">an application from a fake account of a company employee in social networks;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">malicious programs offered to be downloaded by an alleged employee of the company under the pretext of a software update or a law enforcement officer in order to &#8220;verify the account&#8221;;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">hidden buttons in browsers that help attackers get data when the user touches them;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">exploiting the vulnerabilities of unprotected free Wi-Fi networks.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Since the most vulnerable link during phishing attacks is a person, the main protection against attackers is constant vigilance. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">How to understand that you are being attacked:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Very often, messages from criminals have typographical and lexical errors, and errors can also be located in the domain of the site. <\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Usually, fraudsters try to create a sense of urgency, for example, for a person to transfer funds to &#8220;safe accounts&#8221; before the wallets are blocked.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">How to protect yourself from phishing attacks:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Pay attention to errors, check the correct spelling of the site address. Valid addresses only with domains <\/span><b>binance.com<\/b><span style=\"font-weight: 400;\"> and <\/span><b>binance.net<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">It is better to find the site through the search (once again checking the correctness of the domain), or go to it through the bookmarks created earlier in the browser. <\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Check the https certificate (open the lock next to the site address) to ensure that the domain name is genuine.<\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2023\/07\/image4-2.png&#8221; alt=&#8221;image4&#8243; title_text=&#8221;image4&#8243; align=&#8221;center&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Update your browsers regularly. But do not ignore the warnings about switching to a dangerous site, which usually appear in Google Chrome and Mozilla Firefox.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enable two-factor authentication and never share your code with other people.<\/span><\/li>\n<\/ul>\n<p><b>And the main thing<\/b><span style=\"font-weight: 400;\"> \u2014 add a YubiKey security key as an additional means of protecting your account. Attackers will not be able to bypass this protection, even if they get your passwords. Because YubiKey hardware security keys work according to the principle of an apartment or car key: if you don&#8217;t have the key, you can&#8217;t get inside. <\/span><\/p>\n<h2><b>How to Add YubiKey Security Key to Binance<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Buy the YubiKey security key<\/span> <a href=\"https:\/\/shop.thekernel.ua\/en\/online-store\"><span style=\"font-weight: 400;\">from the official website<\/span><\/a><span style=\"font-weight: 400;\"> in Ukraine. If you already have the key, log in to your account on the site and open the &#8220;Profile&#8221; tab. Find the \u201cAccess keys and biometrics\u201d item.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2023\/07\/Screenshot_5.jpg&#8221; alt=&#8221;screenshot 5&#8243; title_text=&#8221;screenshot 5&#8243; align=&#8221;center&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">Click the \u201cAdd new authenticator\u201d button and enter the code that will be sent to your e-mail upon your request. <\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2023\/07\/image5-3.png&#8221; alt=&#8221;image5&#8243; title_text=&#8221;image5&#8243; align=&#8221;center&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">After that, the program will prompt you to add a key.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2023\/07\/Screenshot_6.jpg&#8221; alt=&#8221;screenshot 6&#8243; title_text=&#8221;screenshot 6&#8243; align=&#8221;center&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">Next, depending on your operating system, you will receive a message about adding a key. The system may prompt you to insert or hold the key to the device, enter a PIN, touch the key, etc. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">After fulfilling all the requirements, you will receive a message that the verification was successful.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2023\/07\/Screenshot_10.jpg&#8221; alt=&#8221;screenshot 10&#8243; title_text=&#8221;screenshot 10&#8243; align=&#8221;center&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">In your profile you will see all your added hardware devices.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2023\/07\/Screenshot_11.jpg&#8221; alt=&#8221;screenshot 11&#8243; title_text=&#8221;screenshot 11&#8243; align=&#8221;center&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;16px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">After that, a key will be required for any action in the profile \u2014 changing email or phone, confirming transactions. In this way, your account will be reliably protected from phishing. We always recommend adding a spare key to your account in case one of the keys is accidentally lost. To do this, you will need to go through all the steps above.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The good news is that any YubiKey security keys available in our online store are compatible with the Binance cryptocurrency exchange. And the spare key does not necessarily have to have the same form factor as the main one. So by purchasing an additional key, you close the need to protect accounts in various services.<\/span><\/p>\n<p> <b>If you don&#8217;t have a key yet, or you want to buy a spare, go to our<\/b> <a href=\"https:\/\/shop.thekernel.ua\/en\/online-store\"><b>online store<\/b><\/a> <b>right now!<\/b><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; use_background_color_gradient=&#8221;on&#8221; background_enable_mask_style=&#8221;on&#8221; background_mask_style=&#8221;honeycomb&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 style=\"text-align: center;\">Similar materials in the Knowledge Base<\/h2>\n<p>[\/et_pb_text][et_pb_blog fullwidth=&#8221;off&#8221; posts_number=&#8221;3&#8243; include_categories=&#8221;399&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Binance is one of the largest and most popular cryptocurrency exchanges in the world. With its help, you can monitor the movements of the cryptocurrency market, invest in digital assets and conduct trading operations in real time. Of course, in order to use the platform effectively, you must first protect your accounts and wallets from [&hellip;]<\/p>\n","protected":false},"author":55,"featured_media":264541,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"none","_seopress_titles_title":"How to protect yourself from phishing on Binance with YubiKey","_seopress_titles_desc":"Discover how to protect yourself from phishing on Binance with YubiKey. Implement advanced security features to safeguard your account.","_seopress_robots_index":"","_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[402,439],"tags":[],"class_list":["post-264538","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-settings","category-settings-en"],"acf":[],"_links":{"self":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/264538","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/users\/55"}],"replies":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/comments?post=264538"}],"version-history":[{"count":3,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/264538\/revisions"}],"predecessor-version":[{"id":290025,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/264538\/revisions\/290025"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/media\/264541"}],"wp:attachment":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/media?parent=264538"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/categories?post=264538"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/tags?post=264538"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}