Sim Swapping
By Cryptomcmillan1 | Updated on May 24, 2020
It is a tactic where hacker overtake the mobile phone to exploit the two-factor authentication and two-step verification. Once the hacker gotten hold of the victim's mobile phone number, they could proceed to convince the telco company to migrate the victim's phone number to the hacker's number. Otherwise, they could also intercept any authentication and verification number via text messages or mobile phone and bypass the security of personal accounts such as bank accounts and social media accounts.
Related Terms
Ponzi Scheme
A Ponzi scheme is also referred to as pyramid scheme, and typically takes the form of an investment scheme which pays existing investors with funds collected from new investors.
Software Development Kit (SDK)
It is a collection of software development tools in one package installation. It is designed to help developing applications for a specific device or operating system (OS).
Full Pay-Per-Share (FPPS)
FPPS is quite similar to PPS; the only difference is that the pool will additionally pay a transaction fee incentive if the block is identified. FPPS is the same as PPS+.
Limit Order / Limit Buy / Limit Sell
Orders placed by traders to buy or sell a cryptocurrency when a certain price is reached
Hungry for more knowledge?
Back to Glossary or Subscribe to our newsletter.