Sim Swapping

โดย Cryptomcmillan1 | อัพเดทเมื่อ May 24, 2020
It is a tactic where hacker overtake the mobile phone to exploit the two-factor authentication and two-step verification. Once the hacker gotten hold of the victim's mobile phone number, they could proceed to convince the telco company to migrate the victim's phone number to the hacker's number. Otherwise, they could also intercept any authentication and verification number via text messages or mobile phone and bypass the security of personal accounts such as bank accounts and social media accounts.

แบ่งปันกับเพื่อน!

เงื่อนไขที่เกี่ยวข้อง

Futures
An agreement between two counterparties that obligates them to transact in the future based on the contract terms set.
Rug pull
Sudden removal of liquidity which typically leads to asset prices crashing from the lack of liquidity to absorb buy/sells.
impermanent loss
Temporary loss of funds due to volatility leading to divergence in price between token pairs provided by liquidity providers.
Market Taker
Participant of the market who buys and sells from currently existing orders
กระหายความรู้เพิ่มเติมอีกใช่ไหม
กลับไปที่ อภิธานศัพท์ หรือ สมัคร รับจดหมายข่าวของเรา
coingecko (thumbnail mini)
CoinGecko สำหรับ iOS
coingecko (thumbnail mini)
CoinGecko สำหรับ Android