Sim Swapping

Od użytkownika Cryptomcmillan1 | Data aktualizacji May 24, 2020
It is a tactic where hacker overtake the mobile phone to exploit the two-factor authentication and two-step verification. Once the hacker gotten hold of the victim's mobile phone number, they could proceed to convince the telco company to migrate the victim's phone number to the hacker's number. Otherwise, they could also intercept any authentication and verification number via text messages or mobile phone and bypass the security of personal accounts such as bank accounts and social media accounts.

Podziel się tym z przyjacielem!

Hasła pokrewne

Portfolio
A portfolio consists all of your current crypto holdings in one place.
Privacy Coins
Cryptocurrencies that are designed with transaction anonimity and user privacy in mind.
When Moon
An expression used by investors to ask when the price of a coin would hit a peak
ROI
Short for “Return on Investment”, the ratio between the net profit and cost of investing.
Chcesz dowiedzieć się więcej?
Wróć do słownika lub zapisz się na nasz newsletter.
coingecko (thumbnail mini)
CoinGecko dla systemu iOS
coingecko (thumbnail mini)
CoinGecko dla systemu Android