Glossary

Glossary Terms

Browse our comprehensive Web3 security glossary

Web3

Web3

WWerner VermaakNov 20, 2024

Learn what Web3 is, how it works, the key technologies behind it, and the security challenges users face in decentralized ecosystems.

Web3 Wallet

Web3 Wallet

WWerner VermaakNov 19, 2024

Learn what a Web3 wallet is, how it works, the different types available, and how to secure your wallet against attacks.

Social Engineering

Social Engineering

WWerner VermaakNov 18, 2024

Learn what social engineering is in Web3, common tactics attackers use, and how to protect yourself from psychological manipulation attacks.

Web3 Security

Web3 Security

WWerner VermaakNov 17, 2024

Learn what Web3 security is, the key threats facing decentralized applications and users, and how to protect yourself with a 3-layer security strategy.

Phishing

Phishing

WWerner VermaakNov 16, 2024

Learn what phishing is in Web3, common phishing tactics, and how to protect yourself from fake websites and malicious links.

Transaction Poisoning

Transaction Poisoning

WWerner VermaakNov 15, 2024

Learn what transaction poisoning is, how attackers create lookalike transactions to scam users, and how to protect yourself from this attack.

Smart Contract Vulnerability

Smart Contract Vulnerability

WWerner VermaakNov 14, 2024

Learn what smart contract vulnerabilities are, common types of exploits, and how to protect yourself from vulnerable smart contracts.

ApprovalForAll Exploit

ApprovalForAll Exploit

WWerner VermaakNov 13, 2024

Learn what the setApprovalForAll exploit is, how attackers use it to steal NFTs, and how to protect yourself from malicious approval attacks.

Rugpull

Rugpull

WWerner VermaakNov 12, 2024

Learn what a rugpull is, how scammers execute exit scams, and how to identify and avoid rugpull projects before investing.

Private Key

Private Key

WWerner VermaakNov 11, 2024

Learn what a private key is, how it works, why it's critical for Web3 security, and how to protect your private keys from theft.

Non-Fungible Tokens (NFT)

Non-Fungible Tokens (NFT)

WWerner VermaakNov 10, 2024

Learn what NFTs are, how they work, their use cases, and how to protect your NFTs from theft and scams.

Multisig Wallet

Multisig Wallet

WWerner VermaakNov 9, 2024

Learn what multisig wallets are, how they work, their security benefits, and when to use multi-signature wallets.

Malicious Approvals

Malicious Approvals

WWerner VermaakNov 8, 2024

Learn what malicious approvals are, how attackers use them to drain wallets, and how to protect yourself from approval-based attacks.

Front-End Compromise

Front-End Compromise

WWerner VermaakNov 7, 2024

Learn what front-end compromise is, how attackers hijack dApp interfaces to steal funds, and how to protect yourself from compromised websites.

Flash-Loan Attack

Flash-Loan Attack

WWerner VermaakNov 6, 2024

Learn what flash-loan attacks are, how attackers exploit DeFi protocols using uncollateralized loans, and how to protect yourself.

Fake Airdrop Scam

Fake Airdrop Scam

WWerner VermaakNov 5, 2024

Learn what fake airdrop scams are, how attackers use them to steal funds, and how to identify and avoid fraudulent airdrop campaigns.

DaaS (Drainer-as-a-Service)

DaaS (Drainer-as-a-Service)

WWerner VermaakNov 4, 2024

Learn what Drainer-as-a-Service (DaaS) is, how these illicit platforms enable wallet draining attacks, and how to protect yourself.

Crypto Wallet Drainer

Crypto Wallet Drainer

WWerner VermaakNov 3, 2024

Learn what a crypto wallet drainer is, how it works, and how to protect yourself from wallet draining attacks. Complete guide with real-world examples.

Cross-Chain Bridge Vulnerability

Cross-Chain Bridge Vulnerability

WWerner VermaakNov 2, 2024

Learn what cross-chain bridge vulnerabilities are, how attackers exploit bridges to steal funds, and how to protect yourself when using bridges.

Address Poisoning

Address Poisoning

WWerner VermaakNov 1, 2024

Learn what address poisoning is, how attackers use lookalike addresses to scam Web3 users, and how to protect yourself from this social engineering attack.