C’est la fraude qui peut vous faire perdre des décennies de données #SIMswap

Le piratages de cartes SIM pour s’approprier le numéro mobile d’une victime est une fraude qui a le vent en poupe. Pour en comprendre concrètement ses conséquences, voici les récits de deux mauvaises expériences 🙁

un petit clic pour ma veille

SIM swap horror story: I’ve lost decades of data and Google won’t lift a finger | ZDNet

At 11:30 pm on Monday, 10 June, my oldest daughter shook my shoulder to wake me up from a deep sleep. She said that it appeared my Twitter account had been hacked. It turns out that things were much worse than that.

Here’s how I survived a SIM swap attack after T-Mobile failed me – twice | ZDNet

After a crazy week where T-Mobile handed over my phone number to a hacker twice, I now have my T-Mobile, Google, and Twitter accounts back under my control. However, the weak link in this situation remains and I’m wary of what could happen in the future.

Pour réduire ce risque, voici quelques conseils de base

How to Prevent and Respond to a SIM Swap Scam

When ZDNet’s Matthew Miller got hit with a SIM swap attack, he described it as a “horror story” that caused him to lose “decades of data.” And he’s not being hyperbolic; more than a week later, he’s still dealing with the aftereffects, and there’s no guarantee from some of the major tech players-including Twitter and G…

How to Protect Your Phone Against a SIM Swap Attack

Verizon actually requires a PIN, but to set yours up or change it, head to this site, then sign into your account. Enter the PIN of your choice twice, click Submit, and you’re done. For T-Mobile, you have to call instead; dial 611 from your mobile phone and ask to add “Port Validation” to your account, which lets you choose a six to 15 digit PIN.

et un petit tour par ici pour décrire cette fraude:

SIM swap scam – Wikipedia

A SIM swap scam (also known as port-out scam, SIM splitting, Smishing and simjacking, SIM swapping) is a type of account takeover fraud that generally targets a weakness in two-factor authentication and two-step verification in which the second factor or step is a text message (SMS) or call placed to a mobile telephone.

Veilleur et spécialiste en cybersécurité

Comments are closed.

Newsletter

Me suivre: