Sim Swapping
By Cryptomcmillan1 | Updated on May 24, 2020
It is a tactic where hacker overtake the mobile phone to exploit the two-factor authentication and two-step verification. Once the hacker gotten hold of the victim's mobile phone number, they could proceed to convince the telco company to migrate the victim's phone number to the hacker's number. Otherwise, they could also intercept any authentication and verification number via text messages or mobile phone and bypass the security of personal accounts such as bank accounts and social media accounts.
Related Terms
Mining Contract
Another term for cloud mining, where users can rent or invest in mining capacity online.
Open Source
Open-source software is a type of software released under a license in which the copyright holder grants users the rights to study, change, and distribute the software to anyone and for any purpose.
Mining
It is the process of the miners verify and adding transaction recors into a block.
Scrypt
one of the hashing algoritm used in proof-of-work protocol, scrypt requires more memory in order to performing mining functions
Hungry for more knowledge?
Back to Glossary or Subscribe to our newsletter.