image credit: pixabay

UC Security Strategy: Understanding SIM Swapping Attacks

September 25, 2019

Via: No Jitter

Cellphones, like many digital devices, can be hijacked. It happened to Jack Dorsey, CEO of Twitter, other celebrates, and many ordinary people. So how does cellphone hacking happen and, more importantly, how do you protect yourself from an attack?

The Subscriber Identity Module (SIM) inside a smartphone is used to uniquely identify its owner. A mobile phone service provider uses the SIM, among other things, to seamlessly port a telephone number to a new device. This feature is, normally, used when someone lost a phone, had it stolen, or when they are switching services to a new phone.

Read More on No Jitter