In the past, we’ve all witnessed sim-jacking attacks that allow a hacker to impersonate the targeted victim to steal the phone number. Hackers can gain access to unauthorized information related to the victim using the vulnerability, ‘SimJacker’ was that vulnerability. Recently there’s a similar vulnerability that has popped up, which uses the same SMS-technology to […]
Peter Buttler contributes to online publications, including IDG Network, Infosecurity-magazine, SC Magazine UK, Lifehacker Australia, among others. He covers topics related to Online Security, Big data, IoT and Artificial Intelligence. With more than eight years of IT experience.