CEX.IO News

Important: Security Alert

, April 20, 2017

Dear CEX.IO users, we have noticed a suspicious activity that has targeted multiple accounts. The perpetrator is attempting to access CEX.IO accounts by trying to brute-force a correct 2FA code.

We kindly ask you to check out your security settings in terms of the following:

  1. If you are getting text messages with 2FA codes that you have not requested, your account is under threat.
  2. Please assume the worst case as if the perpetrator knows your password and change it immediately on your email account and CEX.IO account.
  3. Also, check your email account for open sessions and close all suspicious ones.
  4. Users who have the same password for their email, social networks and CEX.IO accounts are the most vulnerable to this threat. If you are one of those users, please change your passwords on all meaningful accounts and use different ones for each of them.

In case of any questions, contact our support team.

Related

CEX.IO News

The #1 Bitcoin Mining Pool represents: GHash.IO Multipool Pro

April 10th, 2014, GHash.IO has launched a brand new scrypt mining feature called the Multipool Pro. With its help our users will be able to mine the most profitable coins and use additional useful settings, such as the conversion and the switch settings.

Apr 10, 2014 | 4 min read
CEX.IO News Education

5 Advice for Those Who Would Like to Start Bitcoin Trading

For those who are new to trading Bitcoin and other various cryptocurrencies, starting off can be quite difficult due to the complications of understanding markets and general trading. Hopefully with the advices presented below you will get a rough idea of how to get started and start earning some

Oct 09, 2014 | 3 min read
CEX.IO News Education

Scam Warning and Disclaimer

Recently, we have noticed the unauthorized use of the Company’s name by the scammers on the internet. Some of our customers have found a so-called CEX.IO сall center number. They were said to provide support service to our clients. After the call, our users got the information that the

Nov 17, 2017 | 3 min read