Sim Swapping

De Cryptomcmillan1 | Actualizado el May 24, 2020
It is a tactic where hacker overtake the mobile phone to exploit the two-factor authentication and two-step verification. Once the hacker gotten hold of the victim's mobile phone number, they could proceed to convince the telco company to migrate the victim's phone number to the hacker's number. Otherwise, they could also intercept any authentication and verification number via text messages or mobile phone and bypass the security of personal accounts such as bank accounts and social media accounts.

¡Comparta esto con un amigo!

Términos relacionados

Proof of Stake (PoS)
A consensus algorthm that assigns block validation queue based on the coins/token locked in by the validator.
Daily Active Addresses (DAA)
On a blockchain, users interact with one another through their addresses, and daily active addresses (DAA) refers to the number of addresses which fulfills the defined activity parameter on a given blockchain.
Mnemonics
Mnemonics are memory aids with a system such as letters or associations that help in recall. *see Mnemonic Phrase.
Byzantine Generals’ Problem
A term used to describe the situation a single strategy which requires consensus from all members within a group who cannot be trusted or verified
¿Tiene ganas de saber más?
Vuelva al glosario o suscríbase a nuestro boletín informativo.
coingecko (thumbnail mini)
CoinGecko para iOS
coingecko (thumbnail mini)
CoinGecko para Android