Sim Swapping

- Cryptomcmillan1 님 | 업데이트: May 24, 2020
It is a tactic where hacker overtake the mobile phone to exploit the two-factor authentication and two-step verification. Once the hacker gotten hold of the victim's mobile phone number, they could proceed to convince the telco company to migrate the victim's phone number to the hacker's number. Otherwise, they could also intercept any authentication and verification number via text messages or mobile phone and bypass the security of personal accounts such as bank accounts and social media accounts.

친구와 공유하세요!

관련 용어

Segregated Witness (SegWit)
A soft fork implementation to change the Bitcoin Protocol's transaction format to address Bitcoin's scalability issues whilst introducing new features.
Off-chain
It refers to transactions occuring outside the blockchain and executed instantly.
Cold Storage
Offline storage of cryptocurrencies which is arguably safer as they also require physical access (eg. hardware wallet, paper wallets)
Bounty
Public tasks available for anyone for a reward
지식에 목마르십니까?
용어집으로 돌아가거나 뉴스레터를 구독하세요.
coingecko (thumbnail mini)
iOS용 코인게코
coingecko (thumbnail mini)
Android용 코인게코