Sim Swapping
By Cryptomcmillan1 | Updated on May 24, 2020
It is a tactic where hacker overtake the mobile phone to exploit the two-factor authentication and two-step verification. Once the hacker gotten hold of the victim's mobile phone number, they could proceed to convince the telco company to migrate the victim's phone number to the hacker's number. Otherwise, they could also intercept any authentication and verification number via text messages or mobile phone and bypass the security of personal accounts such as bank accounts and social media accounts.
Related Terms
Externally Owned Accounts (EOA)
Externally owned accounts (EOAs) are accounts that are controlled by a private key and have no coding associated with them.
Non-Fungible Tokens (NFT)
They are collectible elements within the Ethereum blockchain under ERC-721, where each token refers to a single element with a certain value
Byzantine Fault
A byzantine fault is where an error has occured, yet a computer system does not know due which component/what failed to the lack of information and continues to iterate on a given instruction.
Mining Rig
A dedicated hardware to mine
Hungry for more knowledge?
Back to Glossary or Subscribe to our newsletter.