Sim Swapping
By Cryptomcmillan1 | Updated on May 24, 2020
It is a tactic where hacker overtake the mobile phone to exploit the two-factor authentication and two-step verification. Once the hacker gotten hold of the victim's mobile phone number, they could proceed to convince the telco company to migrate the victim's phone number to the hacker's number. Otherwise, they could also intercept any authentication and verification number via text messages or mobile phone and bypass the security of personal accounts such as bank accounts and social media accounts.
Related Terms
Enterprise Ethereum Alliance (EEA)
Enterprise Ethereum Alliance is made up for a group of Ethereum developers, corporations as well as startups who are collaborating to find ways to use Ethereum for business applications.
Peer to Peer
A communication protocol that does not require a central hub
Over The Counter (OTC)
It refers to the process that cryptocurrencies are being traded outside exchange and it is done directly between two parties
Bounty
Public tasks available for anyone for a reward
Hungry for more knowledge?
Back to Glossary or Subscribe to our newsletter.