Sim Swapping

بواسطة Cryptomcmillan1 | تم التحديث في May 24, 2020
It is a tactic where hacker overtake the mobile phone to exploit the two-factor authentication and two-step verification. Once the hacker gotten hold of the victim's mobile phone number, they could proceed to convince the telco company to migrate the victim's phone number to the hacker's number. Otherwise, they could also intercept any authentication and verification number via text messages or mobile phone and bypass the security of personal accounts such as bank accounts and social media accounts.

شارك هذا مع صديق!

الشروط ذات الصلة

Hard cap
The maximum amount that an ICO will be raising.
Bearish
A term used to indicate negative sentiment towards the market or an asset, where investors believe that there will be downward price movement.
Privacy Coins
Cryptocurrencies that are designed with transaction anonimity and user privacy in mind.
Do Your Own Research (DYOR)
An advice for investors to do their own research on the coins they wanted to invest in
هل أنت متشوّق لمزيد من المعرفة؟
الرجوع إلى المصطلحات أو الاشتراك في نشرتنا الإخبارية.
coingecko (thumbnail mini)
CoinGecko لنظام التشغيل iOS
coingecko (thumbnail mini)
CoinGecko للأجهزة التي تعمل بنظام Android