🔥 Crypto Exchanges - Declining volume, increasingly inorganic web traffic & more! 🔥 Read more in Part Two of our Q2 2020 Cryptocurrency Report

Sim Swapping

By Cryptomcmillan1 | Updated on May 24, 2020
It is a tactic where hacker overtake the mobile phone to exploit the two-factor authentication and two-step verification. Once the hacker gotten hold of the victim's mobile phone number, they could proceed to convince the telco company to migrate the victim's phone number to the hacker's number. Otherwise, they could also intercept any authentication and verification number via text messages or mobile phone and bypass the security of personal accounts such as bank accounts and social media accounts.

Share this with a friend!

Related Terms

Privacy Coins
Cryptocurrencies that are designed with transaction anonimity and user privacy in mind.
Shitcoin
A coin with no obvious potential value or usage.
Hash
A hash function is an output code (unique and alphanumeric) that we obtain from an input string,
Burned Tokens
Tokens which have been sent to addresses whose private key are not known, effectively becoming unusable.
Hungry for more knowledge?
Back to Glossary or Subscribe to our newsletter.
coingecko (thumbnail mini)
CoinGecko for iOS
coingecko (thumbnail mini)
CoinGecko for Android