RISKS
Cyber threats
Enjoy a range of features designed to enhance your project management experience, all at a price that fits your budget.
- Home
- Cyber threats
Ibeacon protects against
£7.2 billion siphoned off blockchains by cybercrime.
Social engineering
This covers cases where a malicious third party deceives a customer into revealing sensitive information, leading to the theft of digital assets, provided the customer has followed ibeacon-approved verification processes.
Account Takeover (ATO)
A security breach in which an unauthorised person gains access to your customers' digital asset account on your platform and subsequently uses this access to successfully request that the digital assets are sent to an alternative wallet address.
Spear phishing
This covers phishing emails that trick customers into granting a malicious third party access to their digital asset accounts, leading to asset theft, provided the customer has implemented Ibeacon-approved Two-Factor Authentication policies.
Address poisoning
A situation where a bad actor has misled your customer into sending funds to an alternative wallet address by closely matching (within 2 characters) a trusted address previously used by your customer.
Ransomware
Where a system that holds the credentials/key material which are required to access your customer's assets is impacted by ransomware, therefore preventing access to their digital assets.
Brute force attack
When a third-party gains access to your customer's digital assets due to a repeated trial and error approach of guessing their log in credentials.
Ibeacon’s risk engine technology is insured so that if a protected transaction turns out to be malicious, we are able to compensate our customers. This is the beacon’s guarantee. beacon’s itself does not provide insurance coverage for assets or operations.

RISKS
Cyber threats
Enjoy a range of features designed to enhance your project management experience, all at a price that fits your budget.
- Home
- Cyber threats
Ibeacon protects against
£7.2 billion siphoned off blockchains by cybercrime.
Social engineering
This covers cases where a malicious third party deceives a customer into revealing sensitive information, leading to the theft of digital assets, provided the customer has followed ibeacon-approved verification processes.
Account Takeover (ATO)
A security breach in which an unauthorised person gains access to your customers' digital asset account on your platform and subsequently uses this access to successfully request that the digital assets are sent to an alternative wallet address.
Spear phishing
This covers phishing emails that trick customers into granting a malicious third party access to their digital asset accounts, leading to asset theft, provided the customer has implemented Ibeacon-approved Two-Factor Authentication policies.
Address poisoning
A situation where a bad actor has misled your customer into sending funds to an alternative wallet address by closely matching (within 2 characters) a trusted address previously used by your customer.
Ransomware
Where a system that holds the credentials/key material which are required to access your customer's assets is impacted by ransomware, therefore preventing access to their digital assets.
Brute force attack
When a third-party gains access to your customer's digital assets due to a repeated trial and error approach of guessing their log in credentials.
Ibeacon’s risk engine technology is insured so that if a protected transaction turns out to be malicious, we are able to compensate our customers. This is the Ibeacon guarantee. Ibeacon itself does not provide insurance coverage for assets or operations.
