You try to get into a program on your laptop, it pushes an authentication message to the cellphone the crooks now have in their control. Many of us have authentication for other programs on our computers tied to our phones. And they’re asking to port out that number and they’re able to simply do that by deceiving and tricking which is social engineering, taking advantage of that human element." Dangers of SIM card swapping "They called, they trick the individual pretend that they are you. "The other is, good old-fashioned social engineering," he said. Then they call your phone company and tell them they want to switch your information to a new phone. "Your phone essentially goes dead and the attacker ports out your number to their device and now they start receiving all of your calls, all of your text messages," Derigiotis said.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |