coingecko (thumbnail mini)
Continue in app
Track prices in real-time
coingecko (thumbnail mini)
Continue in app
Track prices in real-time

Sim Swapping

By Cryptomcmillan1 | Updated on May 24, 2020
It is a tactic where hacker overtake the mobile phone to exploit the two-factor authentication and two-step verification. Once the hacker gotten hold of the victim's mobile phone number, they could proceed to convince the telco company to migrate the victim's phone number to the hacker's number. Otherwise, they could also intercept any authentication and verification number via text messages or mobile phone and bypass the security of personal accounts such as bank accounts and social media accounts.

Share this with a friend!

Related Terms

Faucet
A faucet usually represents a site or app where a user can navigate to for small rewards repeated over time.
Block Explorer
Application or websites which display information such as status of transactions or data contained in a block of a given public blockchain network.
Cryptography
A discipline or field of study which practices using cryptography to convert human-readable information that can only be deciphered by individuals who have the knowledge to.
Hot Wallet
It is a tool that store your cryptocurrencies and always connected to internet
Hungry for more knowledge?
Back to Glossary or Subscribe to our newsletter.