Sim Swapping

Par Cryptomcmillan1 | Mis à jour le May 24, 2020
It is a tactic where hacker overtake the mobile phone to exploit the two-factor authentication and two-step verification. Once the hacker gotten hold of the victim's mobile phone number, they could proceed to convince the telco company to migrate the victim's phone number to the hacker's number. Otherwise, they could also intercept any authentication and verification number via text messages or mobile phone and bypass the security of personal accounts such as bank accounts and social media accounts.

Partagez ceci avec un ami !

Termes connexes

Software Development Kit (SDK)
It is a collection of software development tools in one package installation. It is designed to help developing applications for a specific device or operating system (OS).
Margin Trading
It is a way of investing by borrowing money from a broker (or in crypto, an exchange or platform) to trade
Rug pull
Sudden removal of liquidity which typically leads to asset prices crashing from the lack of liquidity to absorb buy/sells.
Bloodbath
In context of trading, the term bloodbath is commonly used to describe a market which is on a downtrend with many assets suffering from value depreciation.
Vous voulez en savoir plus ?
Revenez au glossaire ou abonnez-vous à notre newsletter.
coingecko (thumbnail mini)
CoinGecko pour iOS
coingecko (thumbnail mini)
CoinGecko pour Android