Sim Swapping

Bởi Cryptomcmillan1 | Cập nhật vào May 24, 2020
It is a tactic where hacker overtake the mobile phone to exploit the two-factor authentication and two-step verification. Once the hacker gotten hold of the victim's mobile phone number, they could proceed to convince the telco company to migrate the victim's phone number to the hacker's number. Otherwise, they could also intercept any authentication and verification number via text messages or mobile phone and bypass the security of personal accounts such as bank accounts and social media accounts.

Chia sẻ trang này với bạn bè!

Điều khoản liên quan

Proof-of-Developer (PoD)
A concept of identifying the developers of a project as a means of vouching reputation for a project
Block Explorer
Application or websites which display information such as status of transactions or data contained in a block of a given public blockchain network.
Stale Block
Double mined blocks that are not included in the blockchain.
Bear Market
Contrary to bull market, it indicates the direction of the market going for downward trend.
Khao khát hiểu biết thêm?
Quay lại Bảng chú giải thuật ngữ hoặc Đăng ký nhận bản tin của chúng tôi.
coingecko (thumbnail mini)
CoinGecko cho iOS
coingecko (thumbnail mini)
CoinGecko cho Android