CEX.IO News

Market spoofing attempts neutralized

, April 17, 2019

We’ve recently neutralized market spoofing attempts on CEX.IO. An internal investigation has been initiated in accordance with corporate procedures. A self-regulated crypto exchange, CEX.IO Ltd is a UK-based company operating in full accordance with British law.

Over its five-year history, the CEX.IO cryptocurrency exchange has proved its high standards of security for customer funds, efficient anti-fraud procedures, and compliance with regulatory frameworks. In addition to PCI DSS certification and MSB status with FinCEN, in December 2018, CEX.IO underwent an independent BSA/AML audit, including the evaluation of internal policies and procedures. In February 2019, CEX.IO reported a 30% decrease in fraud as a result of its upgraded KYC procedure.

What is market spoofing?

Market spoofing is a manipulative strategy when a fraudulent trader places fake limit orders to confuse other traders, who build their price perception in response. Later, the initial order is removed by the fraudulent trader before it’s executed. As a result, other traders lose their perceived profit.

Related

CEX.IO News

Purchase Litecoin in Less Than 5 Minutes on CEX.IO

Since the Litecoin market opened on CEX.IO, we’ve been observing the trading activity of our users with the LTC/USD trading pair. What we’ve noticed is that the interest of the customers in this cryptocurrency is growing every day. So we decided to add an option for buying LTC in

Oct 26, 2018 | 3 min read
CEX.IO News

CEX.IO Temporarily Suspends Cloud Mining Services

Taking into consideration our users’ interests, the recent Bitcoin price drop, as well as the upscaling of the mining difficulty, CEX.IO Bitcoin Exchange would like to announce a temporary suspension of cloud mining services provided by the platform at the time of the next difficulty increase.  According to the 11.5.

Jan 12, 2015 | 2 min read
CEX.IO News Education

What are Public and Private Keys?

Public key cryptography, also known as asymmetric cryptography, is a type of cryptographic algorithms that operate with the help of two separate keys — private and public keys. These two are different, but at the same time they are mathematically related to one another. The keys have unrelated functional

Oct 08, 2014 | 3 min read