Law Enforcement Request Guide1. INTRODUCTION We will respond to law enforcement requests from authorized law enforcement officials with proof of authority. This Law…Jan 2, 2021Jan 2, 2021
How to Deal with Stolen Tokens Transferred to CoinExIf your tokens are stolen from your wallet or account in another platform, and withdrawn to an account in CoinEx after checking, please…Jan 2, 2021Jan 2, 2021
Credential Stuffing AttackWhat is Credential Stuffing Attack? Credential Stuffing Attack is a type of cyberattack where stolen account credentials typically…Jan 2, 2021Jan 2, 2021
Common Cases for ScammersCoinEx didn’t have telephone channels and anyone who impersonate to be one of us are scammers.Jan 2, 2021Jan 2, 2021
How to Prevent Malware?Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network. A wide range of malware…Jan 2, 2021Jan 2, 2021
CoinEx Official ChannelsUnder no circumstance would CoinEx staff ask you for any security information (including login password, secondary verification code…Jan 2, 2021Jan 2, 2021
What is Anti-phishing Code? How to Set it Up?What is anti-phishing code? The anti-phishing code is a security feature provided by CoinEx, which supports users to add a personalized…Jan 2, 2021Jan 2, 2021