Sim Swapping

Por Cryptomcmillan1 | Atualização: May 24, 2020
It is a tactic where hacker overtake the mobile phone to exploit the two-factor authentication and two-step verification. Once the hacker gotten hold of the victim's mobile phone number, they could proceed to convince the telco company to migrate the victim's phone number to the hacker's number. Otherwise, they could also intercept any authentication and verification number via text messages or mobile phone and bypass the security of personal accounts such as bank accounts and social media accounts.

Partilhe isto com um amigo!

Termos relacionados

Bagholder
A person who is holding a large quantity of cryptocurrency which is declining in value or becoming worthless
Cryptography
A discipline or field of study which practices using cryptography to convert human-readable information that can only be deciphered by individuals who have the knowledge to.
Application-Specific Integrated Circuit (ASIC)
Refers to specialized computers that are made to do a very specific task (eg. calculate hashes for Bitcoin's Proof-of-Work)
Bitcoin ATM
A machine from which you can buy or sell Bitcoin. Typically also offers different types of cryptocurrencies.
Ainda não saciou o seu apetite de conhecimento?
Voltar ao Glossário ou Subscrever a nossa newsletter.
coingecko (thumbnail mini)
CoinGecko para iOS
coingecko (thumbnail mini)
CoinGecko para Android