How to Protect Yourself From SIM Swapping Attacks

Two-factor authentication is rapidly becoming a “must-do” in this era of rampant cyber threats. I’ve discussed and encouraged two-factor authentication here and in Learning Tree’s cyber security introduction course. But it must be done correctly. Two-step and two-factor authentication Some organizations use hardware tokens that display numbers that change every thirty seconds or so. Apps […]
Read More ›

SIMply Vunlerable

A very talented security researcher named Karsten Nohl has discovered what could be a major vulnerability in millions of mobile phones. He’s found a way to extract a secret from the SIM card. (He found another vulnerability, too, that may be even more serious. We’ll look at that another time.) This vulnerability can be found […]
Read More ›

Type to search

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.