Sim Swapping
By Cryptomcmillan1 | Updated on May 24, 2020
It is a tactic where hacker overtake the mobile phone to exploit the two-factor authentication and two-step verification. Once the hacker gotten hold of the victim's mobile phone number, they could proceed to convince the telco company to migrate the victim's phone number to the hacker's number. Otherwise, they could also intercept any authentication and verification number via text messages or mobile phone and bypass the security of personal accounts such as bank accounts and social media accounts.
Related Terms
Cryptocurrency
A form of digital currency that utilizes cryptographic protocols to record ownership and prevent counterfeiting
Oracles
In the context of crypto, oracles refers to services which verify real-world and provide data to blockchains/smart contracts.
Stale Block
Double mined blocks that are not included in the blockchain.
Bloodbath
In context of trading, the term bloodbath is commonly used to describe a market which is on a downtrend with many assets suffering from value depreciation.
Hungry for more knowledge?
Back to Glossary or Subscribe to our newsletter.