Sim Swapping
By Cryptomcmillan1 | Updated on May 24, 2020
It is a tactic where hacker overtake the mobile phone to exploit the two-factor authentication and two-step verification. Once the hacker gotten hold of the victim's mobile phone number, they could proceed to convince the telco company to migrate the victim's phone number to the hacker's number. Otherwise, they could also intercept any authentication and verification number via text messages or mobile phone and bypass the security of personal accounts such as bank accounts and social media accounts.
Related Terms
Proof of Work (PoW)
A consensus algorithm in which a block is validated via mathematical hashing
QR Code
Abbreviation "Quick Response Code", QR code is a machine readable optical label that stores up to 3Kb of data
Non-Fungible Tokens (NFT)
They are collectible elements within the Ethereum blockchain under ERC-721, where each token refers to a single element with a certain value
Bots
Refers to software or programmes that automatically trade based on preset behaviours.
Hungry for more knowledge?
Back to Glossary or Subscribe to our newsletter.