🚨 Get Your Free NFT Certificate Mint by Completing the Web3 Exam! START NOW
Learn to gain real rewards

Learn to gain real rewards

Collect Bits, boost your Degree and gain actual rewards!

New
Video Courses
Video Courses
Deprecated
Scale your career with online video courses. Dive into your learning adventure!
Crypto Terms:  Letter S

What is Spear Phishing?

Meaning:
Spear Phishing - a targeted attack that aims to force the victim to reveal their personal data.
medium
2 minutes

Let's find out Spear Phishing meaning, definition in crypto, what is Spear Phishing, and all other detailed facts.

Spear phishing is a cyberattack targeting a specific victim using personal information acquired from social media or other digital sources. Spear phishing attacks are personalized based on the interests of the victim and use targeted tactics to gain their trust, making this type of threat more dangerous than mass phishing attempts.

Spear phishing attacks are often targeted at specific organizations and their employees to cause disruption to the business and damage the company's reputation. Scammers may send emails pretending to be high-level employees inquiring about personal details in an attempt to breach the system.

Moreover, spear phishing emails often contain malware that infects the computer and steals recorded data. If the target is an organization, the malware may spread through the entire internal system, corrupting sensitive work information.

There are methods to detect whether a suspicious email is a spear phishing attempt, as well as strategies on how to avoid being targeted altogether.

Since these emails are targeted, it’s possible that the attacker already has access to some personal information, such as the victim’s address or phone number. Therefore, you should avoid giving out more personal data to unknown parties.

If a spear phishing is targeting a specific company, the attacker may pretend to be a customer or a supplier – a party that would reliably have contact with the organization in question. This can be harder to detect, particularly if the victim does not have frequent contact with legitimate representatives.

  • Organizations should raise awareness of phishing campaigns and provide education programs for employees. The education should concern data protection, security and privacy measures, and ways to detect suspicious emails;
  • Organizations should ensure that the email services used are secure and able to easily identify scam and phishing attempts, as well as other malicious attacks.
  • Users should always create a backup of their data stored in an external device, such as a USB or in cloud storage;
  • All software should be up-to-date to reduce the possibility of system vulnerabilities. Older versions of the software are easier for hackers to breach as they may not contain security updates and patches.
invest in. The selling point of speculation is that the investors take a lot of risks but have the possibility to reach significant gains.<\/p>\n<p>While all investments carry some kind of level of risk, speculative investments depend on the abnormally high level of risk which could go either really poorly or really well. This is because, in order to make sure your investment is successful, you must have an understanding of not only whether the prices increase or decrease, but also why they fluctuate and whether they can bring you a profit in the long run.<\/p>\n<p>When it comes to the crypto sector, there are many mixed opinions about whether <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-cryptocurrency/">cryptocurrency investments can be considered speculative.&nbsp;<\/p>\n<p>It can be quite difficult to grasp the value of any cryptocurrency as they are highly volatile. However, cryptocurrencies like <a href=https://www.bitdegree.org/"https:////www.bitdegree.org//crypto//buy-bitcoin-btc/">Bitcoin and <a href=https://www.bitdegree.org/"https:////www.bitdegree.org//crypto//buy-ethereum-eth/">Ethereum have been commended for their innovations that hold the potential to revolutionize the way we see and interact with money.&nbsp;<\/p>\n<p>In general, whether a crypto investment is speculative or not depends on the cryptocurrency itself. For example, projects that popularize themselves by leeching off global trends like the Squid Game Coin could be considered speculative. On the other hand, if the cryptocurrency project seems to have long-term potential then it&rsquo;s as safe as any other regular investment.<\/p>","definition":"A Speculative Investment, or speculating, is a type of high-risk investment where there is an expectation of a high return.","status":"published","meta_title":"What is Speculative Investment? Definition & Meaning | Crypto Wiki","meta_description":"Speculative Investment meaning: Speculative Investment - A Speculative Investment, or speculating, is a type of high-risk investment where there is an expectation of a high return.","meta_keywords":null}" :prev-section="{"id":706,"wikipedia_url":"https:\/\/en.wikipedia.org\/wiki\/Initial_public_offering","level":"easy","author_id":1,"created_at":"2023-06-19T06:59:00.000000Z","updated_at":"2023-12-17T10:25:37.000000Z","slug":"what-is-spac","title":"What is SPAC?","section":"S","keyword":"SPAC","content":"<p><strong>SPAC<\/strong> stands for special purpose acquisition company and it is a company that has the goal of raising money through an <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-initial-public-offering-ipo/">initial public offering (IPO)<\/strong><\/a> or through merging with a company that already exists. SPACs are <strong>non-commercial entities<\/strong> that are often founded by a group of investors (or sponsors) with the goal of pursuing deals in a specific industry.<\/p>\n<p>The money raised in an IPO by SPACs is placed in an <strong>interest-bearing trust account<\/strong> and cannot be distributed unless the SPAC completes an acquisition or returns the money to investors if it is liquidated. They serve as a link between the general public and enterprises that have difficulty obtaining cash.<\/p>\n<p>SPACs are a preferred way for companies to <strong>go public without the hassles of a typical IPO <\/strong>or an <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-initial-coin-offering-ico/">initial coin offering (ICO)<\/strong><\/a>, and without the substantial market presence that direct listings require. SPACs are more convenient and <strong>faster<\/strong> because, rather than the night before&nbsp;as it is with typical IPOs, corporations acquire assurances from investors early on at an agreed price.<\/p>","definition":"a company that has the goal of raising money through an initial public offering (IPO) or merging with a company that already exists.","status":"published","meta_title":"What is SPAC? Definition & Meaning | Crypto Wiki","meta_description":"SPAC meaning: SPAC - a company that has the goal of raising money through an initial public offering (IPO) or merging with a company that already exists.","meta_keywords":null}" :model="{"id":741,"wikipedia_url":"https:\/\/en.wikipedia.org\/wiki\/Spear_Phishing","level":"medium","author_id":1,"created_at":"2023-06-19T06:59:00.000000Z","updated_at":"2023-12-17T10:26:58.000000Z","slug":"what-is-spear-phishing","title":"What is Spear Phishing?","section":"S","keyword":"Spear Phishing","content":"<p><strong>Spear phishing<\/strong> is a cyberattack targeting a specific victim using personal information acquired from social media or other digital sources. Spear phishing attacks are personalized based on the interests of the victim and use targeted tactics to gain their trust, making this type of threat more dangerous than mass phishing attempts.<\/p>\n<p>Spear phishing attacks are often targeted at specific organizations and their employees to cause disruption to the business and <strong>damage the company's reputation<\/strong>. Scammers may send emails pretending to be high-level employees inquiring about personal details in an attempt to breach the system.<\/p>\n<p>Moreover, spear phishing emails often contain <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-malware/">malware that infects the computer and steals recorded data. If the target is an organization, the malware may <strong>spread<\/strong> through the entire internal system, corrupting sensitive work information.<\/p>\n<p>There are methods to detect whether a suspicious email is a spear phishing attempt, as well as strategies on how to avoid being targeted altogether.<\/p>\n<p>Since these emails are targeted, it&rsquo;s possible that the attacker already has access to some personal information, such as the victim&rsquo;s address or phone number. Therefore, you should avoid giving out more personal data to unknown parties.<\/p>\n<p>If a spear phishing is targeting a specific company, the attacker may pretend to be a customer or a supplier &ndash; a party that would reliably have contact with the organization in question. This can be harder to detect, particularly if the victim does not have frequent contact with legitimate representatives.<\/p>\n<ul>\n<li>Organizations should raise awareness of phishing campaigns and provide education programs for employees. The education should concern data protection, security and privacy measures, and ways to detect suspicious emails;<\/li>\n<li>Organizations should ensure that the email services used are secure and able to easily identify scam and phishing attempts, as well as other malicious attacks.<\/li>\n<li>Users should always <strong>create a backup of their data<\/strong> stored in an external device, such as a USB or in cloud storage;<\/li>\n<li>All software should be up-to-date to reduce the possibility of system vulnerabilities. Older versions of the software are easier for hackers to breach as they may not contain security updates and patches.<\/li>\n<\/ul>","definition":"a targeted attack that aims to force the victim to reveal their personal data.","status":"published","meta_title":"What is Spear Phishing? Definition & Meaning | Crypto Wiki","meta_description":"Spear Phishing meaning: Spear Phishing - a targeted attack that aims to force the victim to reveal their personal data.","meta_keywords":null,"author":{"id":1,"user_id":1,"created_at":"2023-05-03T14:30:55.000000Z","updated_at":"2023-05-11T07:18:20.000000Z","title":"Editor-In-Chief","slug":"aaron-s-editor-in-chief","description":"<p>Having completed a Master&rsquo;s degree on Economics, Politics &amp; Culture for the East Asia region, Aaron has written scientific papers with a comparative analysis of the differences between US&rsquo; Western and Japan&rsquo;s Collective forms of capitalism, 1945-2020.<\/p>\n<p>With close to a decade of experience in the FinTech industry, Aaron understands all of the biggest issues and struggles that crypto enthusiasts face. He&rsquo;s a passionate analyst who is concerned with data-driven and fact-based content, as well as that which speaks to both Web3 natives and industry newcomers.<\/p>\n<p>Aaron is the go-to person for everything and anything related to digital currencies. With a huge passion for blockchain &amp; Web3 education, Aaron strives to transform the space as we know it, and make it more approachable to complete beginners.<\/p>\n<p>Aaron has been quoted by multiple established outlets, and is a published author himself. Even during his free time, he enjoys researching the market trends, and looking for the next supernova.<\/p>","user":{"id":1,"first_name":"Aaron","last_name":"S.","email":"aaron@bitdegree.org","email_sanitized":"aaron@bitdegree.org","email_verified_at":"2023-12-01T09:40:20.000000Z","must_verify_email":false,"is_registered_with_wallet":false,"status":"active","country":"LT","last_connected_ip":"88.119.132.125","image_id":2641,"referral_token":"05TMu2NysXOCn525","referred_by":null,"created_at":"2023-05-03T14:30:55.000000Z","updated_at":"2024-01-09T15:22:21.000000Z","full_name":"Aaron S."}}}" :chapter-list="[{"id":1,"title":"Blockchain","slug":"blockchain","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-blockchain.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/blockchain-101.jpg","rating":100,"sections":[{"chapter_id":1,"order":1,"slug":"what-is-blockchain","title":"What is the Blockchain?","status":"published","modified_content":null},{"chapter_id":1,"order":2,"slug":"decentralized-blockchain","title":"Anonymous & Decentralized Blockchains: The Cornerstone of Crypto","status":"published","modified_content":null},{"chapter_id":1,"order":3,"slug":"blockchain-transaction","title":"What is a Blockchain Transaction in Crypto?","status":"published","modified_content":null},{"chapter_id":1,"order":4,"slug":"crypto-fees","title":"The Different Types of Crypto Fees Explained","status":"published","modified_content":null},{"chapter_id":1,"order":5,"slug":"what-is-bridging-in-crypto","title":"The Key Notion Behind the Concept of Bridging in Crypto","status":"published","modified_content":null},{"chapter_id":1,"order":6,"slug":"types-of-blockchains","title":"Different Types of Blockchains: What to Look Out For?","status":"published","modified_content":null}]},{"id":2,"title":"Cryptocurrencies","slug":"cryptocurrencies","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-cryptocurrencies.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/cryptocurrencies-101.jpg","rating":100,"sections":[{"chapter_id":2,"order":1,"slug":"what-is-a-cryptocurrency","title":"What is a Cryptocurrency?","status":"published","modified_content":null},{"chapter_id":2,"order":2,"slug":"how-does-cryptocurrency-work","title":"How Does Cryptocurrency Work?","status":"published","modified_content":null},{"chapter_id":2,"order":3,"slug":"is-cryptocurrency-a-good-investment","title":"Is Cryptocurrency a Good Investment? The Pros & Cons","status":"published","modified_content":null},{"chapter_id":2,"order":4,"slug":"coin-vs-token","title":"Coin VS Token: How Do They Differ?","status":"published","modified_content":null},{"chapter_id":2,"order":5,"slug":"what-are-stablecoins","title":"What are Stablecoins, Altcoins & Wrapped Coins?","status":"published","modified_content":null},{"chapter_id":2,"order":6,"slug":"what-is-a-bitcoin","title":"Bitcoin: the Pioneer of the Crypto World","status":"published","modified_content":null},{"chapter_id":2,"order":7,"slug":"what-is-ethereum","title":"The Ultimate Blockchain for dApp Creation: Ethereum","status":"published","modified_content":null},{"chapter_id":2,"order":8,"slug":"what-is-cardano-in-crypto","title":"What is Cardano and What is It Used For?","status":"published","modified_content":null},{"chapter_id":2,"order":9,"slug":"what-is-shiba-inu-coin","title":"Shiba Inu: the Dogecoin Killer","status":"published","modified_content":null},{"chapter_id":2,"order":10,"slug":"what-is-solana-in-crypto","title":"Is Solana an Improved Version of Ethereum?","status":"published","modified_content":null},{"chapter_id":2,"order":11,"slug":"what-is-polkadot-in-crypto","title":"The Bridge Between Blockchains: Polkadot","status":"published","modified_content":null},{"chapter_id":2,"order":12,"slug":"what-is-polygon-in-crypto","title":"Polygon: the Essential Scaling Solution for Ethereum","status":"published","modified_content":null},{"chapter_id":2,"order":13,"slug":"what-is-luna-crypto","title":"The Bumpy Road of Terra (LUNA)","status":"published","modified_content":null},{"chapter_id":2,"order":14,"slug":"what-is-fantom-crypto","title":"Is Fantom (FTM) Yet Another Ethereum Killer?","status":"published","modified_content":null},{"chapter_id":2,"order":15,"slug":"what-is-aave-crypto","title":"Aave: Crypto Lending Trailblazer","status":"published","modified_content":null},{"chapter_id":2,"order":16,"slug":"what-is-algorand-crypto","title":"Did Algorand Truly Solve the Blockchain Trilemma?","status":"published","modified_content":null},{"chapter_id":2,"order":17,"slug":"what-is-olympus-dao","title":"Does Olympus DAO Have Anything to Do With Mythology?","status":"published","modified_content":null},{"chapter_id":2,"order":18,"slug":"what-is-avax","title":"Is Avalanche Network (AVAX) Rightfully Called the Future of DeFi?","status":"published","modified_content":null},{"chapter_id":2,"order":19,"slug":"what-is-monero-coin","title":"Monero: Where Cryptocurrency Meets Cryptography","status":"published","modified_content":null},{"chapter_id":2,"order":20,"slug":"what-is-ripple-xrp","title":"Is Ripple \"it\" When it Comes to Cross-Border Transactions?","status":"published","modified_content":null},{"chapter_id":2,"order":21,"slug":"practical-use-of-cryptocurrencies","title":"The Practical Use of Crypto","status":"published","modified_content":null}]},{"id":3,"title":"Crypto Exchanges","slug":"crypto-exchanges","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-exchanges.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-exchanges-101.jpg","rating":80,"sections":[{"chapter_id":3,"order":1,"slug":"how-do-cryptocurrency-exchanges-work","title":"How do Cryptocurrency Exchanges Work?","status":"published","modified_content":null},{"chapter_id":3,"order":2,"slug":"dex-vs-cex","title":"DEX VS CEX: Two Sides of the Crypto Exchange Industry","status":"published","modified_content":null},{"chapter_id":3,"order":3,"slug":"crypto-day-trading","title":"Crypto Day Trading: The Difference Between Buying, Trading, and Swapping","status":"published","modified_content":null},{"chapter_id":3,"order":4,"slug":"kyc-crypto","title":"KYC & AML: The Key to Complying With Legal Industry Standards","status":"published","modified_content":null},{"chapter_id":3,"order":5,"slug":"how-to-buy-crypto","title":"From Fiat to Crypto: How to Buy Crypto for the First Time","status":"published","modified_content":null},{"chapter_id":3,"order":6,"slug":"fiat-to-crypto","title":"Taking Profits: Turning Crypto Into Fiat","status":"published","modified_content":null},{"chapter_id":3,"order":7,"slug":"how-to-use-crypto","title":"You\u2019ve Got Crypto: What Can You Do With It?","status":"published","modified_content":null}]},{"id":4,"title":"Crypto Wallets","slug":"crypto-wallets","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-wallets.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-wallets-101.jpg","rating":80,"sections":[{"chapter_id":4,"order":1,"slug":"what-is-a-crypto-wallet","title":"What is a Crypto Wallet?","status":"published","modified_content":null},{"chapter_id":4,"order":2,"slug":"hot-wallet-vs-cold-wallet","title":"Hot Wallet VS Cold Wallet: Which One to Pick?","status":"published","modified_content":null},{"chapter_id":4,"order":3,"slug":"non-custodial-wallet","title":"What are Non-Custodial Crypto Wallets?","status":"published","modified_content":null},{"chapter_id":4,"order":4,"slug":"what-is-metamask","title":"Metamask: The Leading Non-Custodial Wallet","status":"published","modified_content":null},{"chapter_id":4,"order":37,"slug":"how-safe-is-cryptocurrency","title":"The Key Crypto Wallet Safety Practices: How Safe Can Crypto Be?","status":"published","modified_content":null}]},{"id":5,"title":"NFTs","slug":"nfts","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-nfts.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/nfts-101.jpg","rating":100,"sections":[{"chapter_id":5,"order":2,"slug":"how-to-trade-nfts","title":"NFT Trading: The Ins and Outs","status":"published","modified_content":null},{"chapter_id":5,"order":3,"slug":"buying-nft","title":"Tips and Tricks of Choosing the Right NFTs","status":"published","modified_content":null},{"chapter_id":5,"order":4,"slug":"how-to-store-nft","title":"How to Store NFTs: Best Practices","status":"published","modified_content":null},{"chapter_id":5,"order":5,"slug":"how-to-create-an-nft","title":"How to Create Your Own NFTs?","status":"published","modified_content":null},{"chapter_id":5,"order":6,"slug":"how-to-make-passive-money-with-nft","title":"Making Passive Money with NFTs","status":"published","modified_content":null}]},{"id":6,"title":"dApps & Defi","slug":"dapps-and-defi","updated":true,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-dapps.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/dapps-defi-101.jpg","rating":80,"sections":[{"chapter_id":6,"order":1,"slug":"what-are-nfts","title":"What are Non-Fungible Tokens (NFTs)?","status":"published","modified_content":null},{"chapter_id":6,"order":1,"slug":"what-is-defi","title":"What is Decentralized Finance (DeFi)?","status":"published","modified_content":null},{"chapter_id":6,"order":2,"slug":"what-is-defi-2-0","title":"DeFi 2.0: The New Version of Decentralized Finance","status":"published","modified_content":null},{"chapter_id":6,"order":3,"slug":"what-are-dapps-in-crypto","title":"What Are dApps and How Do They Work?","status":"published","modified_content":null},{"chapter_id":6,"order":4,"slug":"defi-dapps","title":"Picking the Right dApps: Dos and Don'ts","status":"published","modified_content":null},{"chapter_id":6,"order":5,"slug":"what-is-web-3-0","title":"Web 3.0: The Future of the Internet","status":"published","modified_content":null},{"chapter_id":6,"order":6,"slug":"what-are-smart-contracts","title":"What is the Core Purpose of Smart Contracts?","status":"published","modified_content":null},{"chapter_id":6,"order":7,"slug":"what-is-a-dao-in-crypto","title":"The Notion of a Decentralized Autonomous Ogranization (DAO)","status":"published","modified_content":null},{"chapter_id":6,"order":8,"slug":"what-is-staking-in-crypto","title":"What is the Goal of Staking Crypto Assets?","status":"published","modified_content":null},{"chapter_id":6,"order":9,"slug":"what-is-liquidity-pool-in-crypto","title":"What is a Liquidity Pool and How Does It Work?","status":"published","modified_content":null},{"chapter_id":6,"order":10,"slug":"what-is-automated-market-maker","title":"Automated Market Maker: the Cornerstone of the Decentralized Crypto Exchange Industry","status":"published","modified_content":null},{"chapter_id":6,"order":11,"slug":"what-is-yield-farming-in-crypto","title":"The Main Yield Farming Techniques","status":"published","modified_content":null},{"chapter_id":6,"order":12,"slug":"what-is-an-oracle-in-crypto","title":"Crypto Oracles: The Link Between Blockchain and Outside World Data","status":"published","modified_content":null},{"chapter_id":6,"order":13,"slug":"crypto-gambling","title":"The Peculiarities of Decentralized Crypto Gambling","status":"published","modified_content":null},{"chapter_id":6,"order":14,"slug":"what-is-the-metaverse","title":"Metaverse: A New Perception of Reality","status":"published","modified_content":null}]},{"id":7,"title":"Trading & Investing","slug":"trading-and-investing","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-trading.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-trading-101.jpg","rating":80,"sections":[{"chapter_id":7,"order":1,"slug":"where-to-trade-crypto","title":"Where Can You Trade Cryptocurrencies?","status":"published","modified_content":null},{"chapter_id":7,"order":2,"slug":"how-to-invest-in-crypto","title":"Investing in Crypto: What Investing Options Do You Have?","status":"published","modified_content":null},{"chapter_id":7,"order":3,"slug":"ico-vs-ido","title":"ICO vs IDO vs IEO: Which One is the One?","status":"published","modified_content":null},{"chapter_id":7,"order":4,"slug":"what-is-an-airdrop","title":"What are Crypto Airdrops and How to Get Them?","status":"published","modified_content":null},{"chapter_id":7,"order":5,"slug":"how-to-get-free-crypto","title":"How to Get Free Crypto Assets?","status":"published","modified_content":null},{"chapter_id":7,"order":6,"slug":"how-to-arbitrage-crypto","title":"What is Crypto Arbitrage: The Main Principles","status":"published","modified_content":null},{"chapter_id":7,"order":7,"slug":"what-is-a-perpetual-contract","title":"Perpetual Contracts: Futures Contracts Without an Expiration Date","status":"published","modified_content":null},{"chapter_id":7,"order":8,"slug":"what-is-fud","title":"What is FUD: How to Use It to Your Advantage While Investing in Crypto?","status":"published","modified_content":null},{"chapter_id":7,"order":9,"slug":"investing-in-cryptocurrency","title":"Investing in Cryptocurrency: How to Manage Your Risks?","status":"published","modified_content":null},{"chapter_id":7,"order":10,"slug":"what-is-a-rug-pull-in-crypto","title":"What is a Rug Pull in Crypto?","status":"published","modified_content":null},{"chapter_id":7,"order":11,"slug":"how-to-avoid-rug-pulls-in-crypto","title":"How to Spot and Avoid Rug Pulls?","status":"published","modified_content":null},{"chapter_id":7,"order":12,"slug":"how-to-avoid-crypto-taxes","title":"The Key Legal Techniques of Avoiding Crypto Taxes","status":"published","modified_content":null}]},{"id":8,"title":"Crypto Analysis","slug":"crypto-analysis","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-analysis.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-analysis-101.jpg","rating":100,"sections":[{"chapter_id":8,"order":1,"slug":"what-is-bullish-and-bearish","title":"Bearish and Bullish Markets: Do They Matter?","status":"published","modified_content":null},{"chapter_id":8,"order":2,"slug":"best-technical-analysis-indicators-for-crypto","title":"5 Best Crypto Technical Analysis Indicators You Must Know About","status":"published","modified_content":null},{"chapter_id":8,"order":3,"slug":"what-is-candlesticks","title":"Technical Analysis: What are Candlesticks, Trendlines, and Patterns?","status":"published","modified_content":null},{"chapter_id":8,"order":4,"slug":"how-to-track-new-crypto-coins","title":"Crypto Tracking: How to Track Your Favorite Coins & Tokens?","status":"published","modified_content":null},{"chapter_id":8,"order":5,"slug":"how-to-research-crypto","title":"Crypto Research Fundamentals & Social Signals: Your Daily Trading Strategy","status":"published","modified_content":null},{"chapter_id":8,"order":46,"slug":"portfolio-diversification-definition","title":"Portfolio Diversification: The Whats, the Whys, and the Hows","status":"published","modified_content":null}]},{"id":9,"title":"Mining","slug":"mining","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-mining.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-mining-101.jpg","rating":80,"sections":[{"chapter_id":9,"order":1,"slug":"what-is-crypto-mining","title":"Crypto Mining: What It is and How Does It Work?","status":"published","modified_content":null},{"chapter_id":9,"order":2,"slug":"what-is-a-mining-pool","title":"Mining Pools: Is Collective Mining Better Than Solo Mining?","status":"published","modified_content":null},{"chapter_id":9,"order":3,"slug":"what-is-staking-crypto","title":"An Advanced Look into What is Staking Crypto","status":"published","modified_content":null},{"chapter_id":9,"order":4,"slug":"what-is-proof-of-stake-vs-proof-of-work","title":"Proof-of-Work VS Proof-of-Stake: The Differences That Matter","status":"published","modified_content":null},{"chapter_id":9,"order":5,"slug":"what-is-crypto-mining-rig","title":"Crypto Mining Rig: What It is and How to Build One?","status":"published","modified_content":null}]},{"id":10,"title":"Crypto Terms","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/crypto-101-glossary.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-glossary-101.jpg","rating":100,"sections":["A","B","C","D","E","F","G","H","I","J","K","L","M","N","O","P","Q","R","S","T","U","V","W","X","Y","Z"]}]" current-chapter="S" current-section="what-is-spear-phishing">