Sim Swapping
By Cryptomcmillan1 | Updated on May 24, 2020
It is a tactic where hacker overtake the mobile phone to exploit the two-factor authentication and two-step verification. Once the hacker gotten hold of the victim's mobile phone number, they could proceed to convince the telco company to migrate the victim's phone number to the hacker's number. Otherwise, they could also intercept any authentication and verification number via text messages or mobile phone and bypass the security of personal accounts such as bank accounts and social media accounts.
Related Terms
Market Maker
Participant of the market who creates buy and orders
Moon
"Moon" or "To the moon" is a crypto slang that describes an exclamation when the cryptocurrencies prices are rising and when it hit the peak, the coin is said to be "mooning".
Byzantine Generals’ Problem
A term used to describe the situation a single strategy which requires consensus from all members within a group who cannot be trusted or verified
Derivatives
A financial instrument which derives its value from the performance of an underlying asset or index (eg. gold, crude oil)
Hungry for more knowledge?
Back to Glossary or Subscribe to our newsletter.