Monday, August 20, 2018
What happens when hackers steal your SIM? You learn to keep your crypto offline – TechCrunch
A year ago I felt a panic that still reverberates in me today. Hackers swapped my T-Mobile SIM card without my approval and methodically shut down access to most of my accounts and began reaching out to my Facebook friends asking to borrow crypto. Their social engineering tactics, to be clear, were laughable but they could have been catastrophic if my friends were less savvy. Flash forward a
Subscribe to:
Post Comments (Atom)
Featured Post
Hackers Exploiting ProxyLogon and ProxyShell Flaws in Spam Campaigns
Threat actors are exploiting ProxyLogon and ProxyShell exploits in unpatched Microsoft Exchange Servers as part of an ongoing spam campaign
Popular Posts
-
Threat actors are exploiting ProxyLogon and ProxyShell exploits in unpatched Microsoft Exchange Servers as part of an ongoing spam campaign
-
Following the release of iOS 10.3.2 on May 15, Apple has stopped signing iOS 10.3.1, the previous version of iOS that was available to consu...
No comments:
Post a Comment