🚨 Get Your Free NFT Certificate Mint by Completing the Web3 Exam! START NOW
Learn to gain real rewards

Learn to gain real rewards

Collect Bits, boost your Degree and gain actual rewards!

New
Video Courses
Video Courses
Deprecated
Scale your career with online video courses. Dive into your learning adventure!
Crypto Terms:  Letter M

What is Malware?

Meaning:
Malware - is a type of malicious program that grants unauthorized access or damages a system.
easy
2 minutes

Let's find out Malware meaning, definition in crypto, what is Malware, and all other detailed facts.

Malware, also referred to as malicious software, is a type of program used by hackers to gain unauthorized access to a system, or harm a computer, network, or server. Malicious individuals or groups utilize these harmful programs to steal personal information from the infected system.

There are nine types of malicious software in total. However, viruses, worms, and Trojan malware are among the most infamous ones:

  • A computer virus is one of the most known types of malware as it is the most widespread. Viruses are proficient in infecting various files quickly and making relevant changes;
  • Worms are infamous for infecting email systems. It’s a piece of cake for this type of malicious software to take over an entire computer system or even a network without the interference of the end-users. This is mainly due to their self-replicating nature;
  • Trojan’s goal is to collect the victim’s sensitive information. Computers are usually infected by visiting unprotected websites or opening malicious emails.

In the context of cryptocurrency, attackers using malicious software have had a difficult time when trying to directly infect blockchain systems. Their distributed nature acts as a shield against malicious software.

Therefore, hackers found a way around this obstacle in order to scam people out of their money. Attackers do this by infiltrating a targeted user’s device and walking away with their keys or exchange credentials.

In order to protect themselves, users are advised to install the latest anti-virus software. Naturally, they should also stay away from unknown websites.

Encryption can protect users from experiencing MITM attacks. In some cases, attackers may employ methods like <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-phishing/">phishing to trick users into visiting scam websites that appear legitimate. Data acquired from phishing websites can be harvested or recorded with little to no trace, meaning that users often don&rsquo;t know they fell victim to a MITM attack.<\/p>\n<p>Man-in-the-middle attacks attempt to <strong>avoid mutual authentication<\/strong>. This means that the attacker must impersonate each end of the conversation well enough to convince the parties that the conversation is not intercepted. <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-cryptography/">Cryptographic protocols rely on endpoint authentication to prevent MITM attackers from interfering.<\/p>\n<p>Transport Layer Security, or TLS, uses a mutually trusted certificate of trust to authenticate the identities of the parties involved in the conversation.<\/p>","definition":" a type of cyberattack where the attacker eavesdrops on a conversation between two parties.","status":"published","meta_title":"What is Man-in-the-Middle Attack (MITM)? Definition & Meaning | Crypto Wiki","meta_description":"Man-in-the-Middle Attack (MITM) meaning: Man-in-the-Middle Attack (MITM) - a type of cyberattack where the attacker eavesdrops on a conversation between two parties.","meta_keywords":null}" :prev-section="{"id":473,"wikipedia_url":"https:\/\/en.wikipedia.org\/wiki\/Blockchain","level":"medium","author_id":1,"created_at":"2023-06-19T06:59:00.000000Z","updated_at":"2024-01-08T04:16:19.000000Z","slug":"what-is-mainnet-swap","title":"What is Mainnet Swap?","section":"M","keyword":"Mainnet Swap","content":"<p>At this time, mainnet swap's cryptocurrency tokens are progressively being swapped with freshly produced <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-coin/">coins, and all blockchain activity is being transferred to the new chain.<\/p>\n<p>When a cryptocurrency project is in the testnet phase, a third-party blockchain network is employed. However, when it transitions from the testnet to the mainnet phase, users will get native cryptocurrency in return for their third-party tokens. As a result, it's also known as token migration or token swap.<\/p>\n<p>Users can either switch their tokens themselves or leave them to the platform, based on the primary aspects of implementation. <a href=https://www.bitdegree.org/"https:////www.bitdegree.org//crypto//goon//binance/" target=\"_blank\" rel=\"nofollow noindex noopener\"><strong>Binance<\/strong><\/a>, for instance, permitted users to leave previously issued tokens on their accounts so that the network could automatically <strong>switch them out for native tokens<\/strong>.<\/p>\n<p>Keep in mind that token migration isn&rsquo;t always necessarily linked to the introduction of a new blockchain. It can also take place when projects switch from one protocol to another.<\/p>\n<p>Another example would be Storj, which did a mainnet switch, transferring their tokens from a <a href=https://www.bitdegree.org/"//crypto//buy-bitcoin-btc/">Bitcoin-based protocol to the <a href=https://www.bitdegree.org/"//crypto//buy-ethereum-eth/">Ethereum network in order to prevent scaling issues.<\/p>\n<h3>When does the Mainnet Swap Happen?<\/h3>\n<p>A mainnet swap often happens when a cryptocurrency project migrates its tokens from one blockchain to another or from a third-party blockchain to its native chain. Besides, the mainnet swap is not solely related to emerging blockchains. If a project intends to switch from one protocol to another, it might make an announcement.<\/p>\n<p>The complexities of how a mainnet switch is executed differ from project to project. The majority of projects provide users a timeframe for token transfer, meaning that is possible to lose access to your tokens because they're generally <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-burning/">burnt after a specific time period.<\/p>\n<h3>Example of Mainnet Swap<\/h3>\n<p>Users were urged to move from the Ethereum blockchain to the Binance Chain following the introduction of the Binance Chain mainnet. As a result, <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-erc-20/">ERC-20 BNB token holders began to exchange their tokens for the newly created BEP2 BNB currency.&nbsp;<\/p>\n<p>The mainnet exchange used a 1:1 ratio, thus 1 ERC-20 BNB was worth the same as 1 BEP2 BNB. Following the transfer, all leftover ERC-20 BNB tokens were burnt, leaving just the BNB of the new chain usable.<\/p>","definition":"is the migration of a cryptocurrency project from a third-party blockchain network to its native blockchain network.","status":"published","meta_title":"What is Mainnet Swap? Definition & Meaning | Crypto Wiki","meta_description":"Mainnet Swap meaning: Mainnet Swap - is the migration of a cryptocurrency project from a third-party blockchain network to its native blockchain network.","meta_keywords":null}" :model="{"id":540,"wikipedia_url":"https:\/\/en.wikipedia.org\/wiki\/Malware","level":"easy","author_id":1,"created_at":"2023-06-19T06:59:00.000000Z","updated_at":"2024-01-08T04:23:11.000000Z","slug":"what-is-malware","title":"What is Malware?","section":"M","keyword":"Malware","content":"<p><strong>Malware<\/strong>, also referred to as malicious software, is a type of <strong>program used by hackers to gain unauthorized access to a system, or harm a computer, network, or server<\/strong>. Malicious individuals or groups utilize these harmful programs to steal personal information from the infected system.<\/p>\n<p>There are nine types of malicious software in total. However, <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-virus/">viruses, worms, and <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-hidden-cap/">Trojan malware are among the most infamous ones:<\/p>\n<ul>\n<li>A <strong>computer virus<\/strong> is one of the most known types of malware as it is the most widespread. Viruses are proficient in infecting various files quickly and making relevant changes;<\/li>\n<li><strong>Worms<\/strong> are infamous for infecting email systems. It&rsquo;s a piece of cake for this type of malicious software to take over an entire computer system or even a network without the interference of the end-users. This is mainly due to their self-replicating nature;<\/li>\n<li><strong>Trojan&rsquo;s<\/strong> goal is to collect the victim&rsquo;s sensitive information. Computers are usually infected by visiting unprotected websites or opening malicious emails.<\/li>\n<\/ul>\n<p>In the context of cryptocurrency, attackers using malicious software have had a difficult time when trying to directly infect blockchain systems. Their distributed nature acts as a shield against malicious software.<\/p>\n<p>Therefore, hackers found a way around this obstacle in order to scam people out of their money. Attackers do this by infiltrating a targeted user&rsquo;s device and walking away with their keys or exchange credentials.<\/p>\n<p>In order to protect themselves, users are advised to install the latest <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-antivirus/">anti-virus software<\/strong><\/a>. Naturally, they should also stay away from unknown websites.<\/p>","definition":"is a type of malicious program that grants unauthorized access or damages a system.","status":"published","meta_title":"What is Malware? Definition & Meaning | Crypto Wiki","meta_description":"Malware meaning: Malware - is a type of malicious program that grants unauthorized access or damages a system.","meta_keywords":null,"author":{"id":1,"user_id":1,"created_at":"2023-05-03T14:30:55.000000Z","updated_at":"2023-05-11T07:18:20.000000Z","title":"Editor-In-Chief","slug":"aaron-s-editor-in-chief","description":"<p>Having completed a Master&rsquo;s degree on Economics, Politics &amp; Culture for the East Asia region, Aaron has written scientific papers with a comparative analysis of the differences between US&rsquo; Western and Japan&rsquo;s Collective forms of capitalism, 1945-2020.<\/p>\n<p>With close to a decade of experience in the FinTech industry, Aaron understands all of the biggest issues and struggles that crypto enthusiasts face. He&rsquo;s a passionate analyst who is concerned with data-driven and fact-based content, as well as that which speaks to both Web3 natives and industry newcomers.<\/p>\n<p>Aaron is the go-to person for everything and anything related to digital currencies. With a huge passion for blockchain &amp; Web3 education, Aaron strives to transform the space as we know it, and make it more approachable to complete beginners.<\/p>\n<p>Aaron has been quoted by multiple established outlets, and is a published author himself. Even during his free time, he enjoys researching the market trends, and looking for the next supernova.<\/p>","user":{"id":1,"first_name":"Aaron","last_name":"S.","email":"aaron@bitdegree.org","email_sanitized":"aaron@bitdegree.org","email_verified_at":"2023-12-01T09:40:20.000000Z","must_verify_email":false,"is_registered_with_wallet":false,"status":"active","country":"LT","last_connected_ip":"88.119.132.125","image_id":2641,"referral_token":"05TMu2NysXOCn525","referred_by":null,"created_at":"2023-05-03T14:30:55.000000Z","updated_at":"2024-01-09T15:22:21.000000Z","full_name":"Aaron S."}}}" :chapter-list="[{"id":1,"title":"Blockchain","slug":"blockchain","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-blockchain.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/blockchain-101.jpg","rating":100,"sections":[{"chapter_id":1,"order":1,"slug":"what-is-blockchain","title":"What is the Blockchain?","status":"published","modified_content":null},{"chapter_id":1,"order":2,"slug":"decentralized-blockchain","title":"Anonymous & Decentralized Blockchains: The Cornerstone of Crypto","status":"published","modified_content":null},{"chapter_id":1,"order":3,"slug":"blockchain-transaction","title":"What is a Blockchain Transaction in Crypto?","status":"published","modified_content":null},{"chapter_id":1,"order":4,"slug":"crypto-fees","title":"The Different Types of Crypto Fees Explained","status":"published","modified_content":null},{"chapter_id":1,"order":5,"slug":"what-is-bridging-in-crypto","title":"The Key Notion Behind the Concept of Bridging in Crypto","status":"published","modified_content":null},{"chapter_id":1,"order":6,"slug":"types-of-blockchains","title":"Different Types of Blockchains: What to Look Out For?","status":"published","modified_content":null}]},{"id":2,"title":"Cryptocurrencies","slug":"cryptocurrencies","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-cryptocurrencies.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/cryptocurrencies-101.jpg","rating":100,"sections":[{"chapter_id":2,"order":1,"slug":"what-is-a-cryptocurrency","title":"What is a Cryptocurrency?","status":"published","modified_content":null},{"chapter_id":2,"order":2,"slug":"how-does-cryptocurrency-work","title":"How Does Cryptocurrency Work?","status":"published","modified_content":null},{"chapter_id":2,"order":3,"slug":"is-cryptocurrency-a-good-investment","title":"Is Cryptocurrency a Good Investment? The Pros & Cons","status":"published","modified_content":null},{"chapter_id":2,"order":4,"slug":"coin-vs-token","title":"Coin VS Token: How Do They Differ?","status":"published","modified_content":null},{"chapter_id":2,"order":5,"slug":"what-are-stablecoins","title":"What are Stablecoins, Altcoins & Wrapped Coins?","status":"published","modified_content":null},{"chapter_id":2,"order":6,"slug":"what-is-a-bitcoin","title":"Bitcoin: the Pioneer of the Crypto World","status":"published","modified_content":null},{"chapter_id":2,"order":7,"slug":"what-is-ethereum","title":"The Ultimate Blockchain for dApp Creation: Ethereum","status":"published","modified_content":null},{"chapter_id":2,"order":8,"slug":"what-is-cardano-in-crypto","title":"What is Cardano and What is It Used For?","status":"published","modified_content":null},{"chapter_id":2,"order":9,"slug":"what-is-shiba-inu-coin","title":"Shiba Inu: the Dogecoin Killer","status":"published","modified_content":null},{"chapter_id":2,"order":10,"slug":"what-is-solana-in-crypto","title":"Is Solana an Improved Version of Ethereum?","status":"published","modified_content":null},{"chapter_id":2,"order":11,"slug":"what-is-polkadot-in-crypto","title":"The Bridge Between Blockchains: Polkadot","status":"published","modified_content":null},{"chapter_id":2,"order":12,"slug":"what-is-polygon-in-crypto","title":"Polygon: the Essential Scaling Solution for Ethereum","status":"published","modified_content":null},{"chapter_id":2,"order":13,"slug":"what-is-luna-crypto","title":"The Bumpy Road of Terra (LUNA)","status":"published","modified_content":null},{"chapter_id":2,"order":14,"slug":"what-is-fantom-crypto","title":"Is Fantom (FTM) Yet Another Ethereum Killer?","status":"published","modified_content":null},{"chapter_id":2,"order":15,"slug":"what-is-aave-crypto","title":"Aave: Crypto Lending Trailblazer","status":"published","modified_content":null},{"chapter_id":2,"order":16,"slug":"what-is-algorand-crypto","title":"Did Algorand Truly Solve the Blockchain Trilemma?","status":"published","modified_content":null},{"chapter_id":2,"order":17,"slug":"what-is-olympus-dao","title":"Does Olympus DAO Have Anything to Do With Mythology?","status":"published","modified_content":null},{"chapter_id":2,"order":18,"slug":"what-is-avax","title":"Is Avalanche Network (AVAX) Rightfully Called the Future of DeFi?","status":"published","modified_content":null},{"chapter_id":2,"order":19,"slug":"what-is-monero-coin","title":"Monero: Where Cryptocurrency Meets Cryptography","status":"published","modified_content":null},{"chapter_id":2,"order":20,"slug":"what-is-ripple-xrp","title":"Is Ripple \"it\" When it Comes to Cross-Border Transactions?","status":"published","modified_content":null},{"chapter_id":2,"order":21,"slug":"practical-use-of-cryptocurrencies","title":"The Practical Use of Crypto","status":"published","modified_content":null}]},{"id":3,"title":"Crypto Exchanges","slug":"crypto-exchanges","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-exchanges.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-exchanges-101.jpg","rating":80,"sections":[{"chapter_id":3,"order":1,"slug":"how-do-cryptocurrency-exchanges-work","title":"How do Cryptocurrency Exchanges Work?","status":"published","modified_content":null},{"chapter_id":3,"order":2,"slug":"dex-vs-cex","title":"DEX VS CEX: Two Sides of the Crypto Exchange Industry","status":"published","modified_content":null},{"chapter_id":3,"order":3,"slug":"crypto-day-trading","title":"Crypto Day Trading: The Difference Between Buying, Trading, and Swapping","status":"published","modified_content":null},{"chapter_id":3,"order":4,"slug":"kyc-crypto","title":"KYC & AML: The Key to Complying With Legal Industry Standards","status":"published","modified_content":null},{"chapter_id":3,"order":5,"slug":"how-to-buy-crypto","title":"From Fiat to Crypto: How to Buy Crypto for the First Time","status":"published","modified_content":null},{"chapter_id":3,"order":6,"slug":"fiat-to-crypto","title":"Taking Profits: Turning Crypto Into Fiat","status":"published","modified_content":null},{"chapter_id":3,"order":7,"slug":"how-to-use-crypto","title":"You\u2019ve Got Crypto: What Can You Do With It?","status":"published","modified_content":null}]},{"id":4,"title":"Crypto Wallets","slug":"crypto-wallets","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-wallets.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-wallets-101.jpg","rating":80,"sections":[{"chapter_id":4,"order":1,"slug":"what-is-a-crypto-wallet","title":"What is a Crypto Wallet?","status":"published","modified_content":null},{"chapter_id":4,"order":2,"slug":"hot-wallet-vs-cold-wallet","title":"Hot Wallet VS Cold Wallet: Which One to Pick?","status":"published","modified_content":null},{"chapter_id":4,"order":3,"slug":"non-custodial-wallet","title":"What are Non-Custodial Crypto Wallets?","status":"published","modified_content":null},{"chapter_id":4,"order":4,"slug":"what-is-metamask","title":"Metamask: The Leading Non-Custodial Wallet","status":"published","modified_content":null},{"chapter_id":4,"order":37,"slug":"how-safe-is-cryptocurrency","title":"The Key Crypto Wallet Safety Practices: How Safe Can Crypto Be?","status":"published","modified_content":null}]},{"id":5,"title":"NFTs","slug":"nfts","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-nfts.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/nfts-101.jpg","rating":100,"sections":[{"chapter_id":5,"order":2,"slug":"how-to-trade-nfts","title":"NFT Trading: The Ins and Outs","status":"published","modified_content":null},{"chapter_id":5,"order":3,"slug":"buying-nft","title":"Tips and Tricks of Choosing the Right NFTs","status":"published","modified_content":null},{"chapter_id":5,"order":4,"slug":"how-to-store-nft","title":"How to Store NFTs: Best Practices","status":"published","modified_content":null},{"chapter_id":5,"order":5,"slug":"how-to-create-an-nft","title":"How to Create Your Own NFTs?","status":"published","modified_content":null},{"chapter_id":5,"order":6,"slug":"how-to-make-passive-money-with-nft","title":"Making Passive Money with NFTs","status":"published","modified_content":null}]},{"id":6,"title":"dApps & Defi","slug":"dapps-and-defi","updated":true,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-dapps.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/dapps-defi-101.jpg","rating":80,"sections":[{"chapter_id":6,"order":1,"slug":"what-are-nfts","title":"What are Non-Fungible Tokens (NFTs)?","status":"published","modified_content":null},{"chapter_id":6,"order":1,"slug":"what-is-defi","title":"What is Decentralized Finance (DeFi)?","status":"published","modified_content":null},{"chapter_id":6,"order":2,"slug":"what-is-defi-2-0","title":"DeFi 2.0: The New Version of Decentralized Finance","status":"published","modified_content":null},{"chapter_id":6,"order":3,"slug":"what-are-dapps-in-crypto","title":"What Are dApps and How Do They Work?","status":"published","modified_content":null},{"chapter_id":6,"order":4,"slug":"defi-dapps","title":"Picking the Right dApps: Dos and Don'ts","status":"published","modified_content":null},{"chapter_id":6,"order":5,"slug":"what-is-web-3-0","title":"Web 3.0: The Future of the Internet","status":"published","modified_content":null},{"chapter_id":6,"order":6,"slug":"what-are-smart-contracts","title":"What is the Core Purpose of Smart Contracts?","status":"published","modified_content":null},{"chapter_id":6,"order":7,"slug":"what-is-a-dao-in-crypto","title":"The Notion of a Decentralized Autonomous Ogranization (DAO)","status":"published","modified_content":null},{"chapter_id":6,"order":8,"slug":"what-is-staking-in-crypto","title":"What is the Goal of Staking Crypto Assets?","status":"published","modified_content":null},{"chapter_id":6,"order":9,"slug":"what-is-liquidity-pool-in-crypto","title":"What is a Liquidity Pool and How Does It Work?","status":"published","modified_content":null},{"chapter_id":6,"order":10,"slug":"what-is-automated-market-maker","title":"Automated Market Maker: the Cornerstone of the Decentralized Crypto Exchange Industry","status":"published","modified_content":null},{"chapter_id":6,"order":11,"slug":"what-is-yield-farming-in-crypto","title":"The Main Yield Farming Techniques","status":"published","modified_content":null},{"chapter_id":6,"order":12,"slug":"what-is-an-oracle-in-crypto","title":"Crypto Oracles: The Link Between Blockchain and Outside World Data","status":"published","modified_content":null},{"chapter_id":6,"order":13,"slug":"crypto-gambling","title":"The Peculiarities of Decentralized Crypto Gambling","status":"published","modified_content":null},{"chapter_id":6,"order":14,"slug":"what-is-the-metaverse","title":"Metaverse: A New Perception of Reality","status":"published","modified_content":null}]},{"id":7,"title":"Trading & Investing","slug":"trading-and-investing","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-trading.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-trading-101.jpg","rating":80,"sections":[{"chapter_id":7,"order":1,"slug":"where-to-trade-crypto","title":"Where Can You Trade Cryptocurrencies?","status":"published","modified_content":null},{"chapter_id":7,"order":2,"slug":"how-to-invest-in-crypto","title":"Investing in Crypto: What Investing Options Do You Have?","status":"published","modified_content":null},{"chapter_id":7,"order":3,"slug":"ico-vs-ido","title":"ICO vs IDO vs IEO: Which One is the One?","status":"published","modified_content":null},{"chapter_id":7,"order":4,"slug":"what-is-an-airdrop","title":"What are Crypto Airdrops and How to Get Them?","status":"published","modified_content":null},{"chapter_id":7,"order":5,"slug":"how-to-get-free-crypto","title":"How to Get Free Crypto Assets?","status":"published","modified_content":null},{"chapter_id":7,"order":6,"slug":"how-to-arbitrage-crypto","title":"What is Crypto Arbitrage: The Main Principles","status":"published","modified_content":null},{"chapter_id":7,"order":7,"slug":"what-is-a-perpetual-contract","title":"Perpetual Contracts: Futures Contracts Without an Expiration Date","status":"published","modified_content":null},{"chapter_id":7,"order":8,"slug":"what-is-fud","title":"What is FUD: How to Use It to Your Advantage While Investing in Crypto?","status":"published","modified_content":null},{"chapter_id":7,"order":9,"slug":"investing-in-cryptocurrency","title":"Investing in Cryptocurrency: How to Manage Your Risks?","status":"published","modified_content":null},{"chapter_id":7,"order":10,"slug":"what-is-a-rug-pull-in-crypto","title":"What is a Rug Pull in Crypto?","status":"published","modified_content":null},{"chapter_id":7,"order":11,"slug":"how-to-avoid-rug-pulls-in-crypto","title":"How to Spot and Avoid Rug Pulls?","status":"published","modified_content":null},{"chapter_id":7,"order":12,"slug":"how-to-avoid-crypto-taxes","title":"The Key Legal Techniques of Avoiding Crypto Taxes","status":"published","modified_content":null}]},{"id":8,"title":"Crypto Analysis","slug":"crypto-analysis","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-analysis.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-analysis-101.jpg","rating":100,"sections":[{"chapter_id":8,"order":1,"slug":"what-is-bullish-and-bearish","title":"Bearish and Bullish Markets: Do They Matter?","status":"published","modified_content":null},{"chapter_id":8,"order":2,"slug":"best-technical-analysis-indicators-for-crypto","title":"5 Best Crypto Technical Analysis Indicators You Must Know About","status":"published","modified_content":null},{"chapter_id":8,"order":3,"slug":"what-is-candlesticks","title":"Technical Analysis: What are Candlesticks, Trendlines, and Patterns?","status":"published","modified_content":null},{"chapter_id":8,"order":4,"slug":"how-to-track-new-crypto-coins","title":"Crypto Tracking: How to Track Your Favorite Coins & Tokens?","status":"published","modified_content":null},{"chapter_id":8,"order":5,"slug":"how-to-research-crypto","title":"Crypto Research Fundamentals & Social Signals: Your Daily Trading Strategy","status":"published","modified_content":null},{"chapter_id":8,"order":46,"slug":"portfolio-diversification-definition","title":"Portfolio Diversification: The Whats, the Whys, and the Hows","status":"published","modified_content":null}]},{"id":9,"title":"Mining","slug":"mining","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-mining.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-mining-101.jpg","rating":80,"sections":[{"chapter_id":9,"order":1,"slug":"what-is-crypto-mining","title":"Crypto Mining: What It is and How Does It Work?","status":"published","modified_content":null},{"chapter_id":9,"order":2,"slug":"what-is-a-mining-pool","title":"Mining Pools: Is Collective Mining Better Than Solo Mining?","status":"published","modified_content":null},{"chapter_id":9,"order":3,"slug":"what-is-staking-crypto","title":"An Advanced Look into What is Staking Crypto","status":"published","modified_content":null},{"chapter_id":9,"order":4,"slug":"what-is-proof-of-stake-vs-proof-of-work","title":"Proof-of-Work VS Proof-of-Stake: The Differences That Matter","status":"published","modified_content":null},{"chapter_id":9,"order":5,"slug":"what-is-crypto-mining-rig","title":"Crypto Mining Rig: What It is and How to Build One?","status":"published","modified_content":null}]},{"id":10,"title":"Crypto Terms","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/crypto-101-glossary.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-glossary-101.jpg","rating":100,"sections":["A","B","C","D","E","F","G","H","I","J","K","L","M","N","O","P","Q","R","S","T","U","V","W","X","Y","Z"]}]" current-chapter="M" current-section="what-is-malware">