• Skip to primary navigation
  • Skip to content
  • Skip to primary sidebar
  • Skip to footer
Wooster

Technology@​Wooster

Collaborating with the campus community to explore questions of​ pedagogy, best practices, and technology integration.

  • For Students
    • What Technology do I need at Wooster
    • Computer Labs
    • Downloads
    • Wireless
    • Printing
    • E-Mail
    • Gaming Consoles
    • Poster Printing
  • I’d like to
  • Events
  • Staff
    • Applications Development
    • Educational Technology
      • About
    • Information and Planning
    • Research and Planning
    • Technology Services
      • Digital Infrastructure
      • Media and Event Support
      • Technology Services – Media Services
      • Technology Services – Service Desk
    • Student Digital Media Assistants
    • Student Research Assistants
    • Student Technology Assistants
  • Resources
    • ArcGIS Online
    • Hoonuit online training
    • Moodle
    • Professional Development
    • Projects in a Box
    • Qualtrics
    • Select Survey
    • WordPress(Voices)
    • Workshops
  • Technologies
    • Classroom Technology
      • Document Cameras
      • Epson Technologies
      • SMART Technologies
      • Student Response Systems
      • Video Conferencing
    • Digital Media
      • Audio
      • Images
      • Mobile Apps
      • Presentation
      • Video
    • Virtual Reality
      • VR Resources
      • Virtual Worlds
    • Web 2.0
      • Information Management
      • Mashups
      • Media Sharing
      • Social Communication
      • Social Knowledge Building
    • Web Authoring
      • Blogging
      • CMS
      • Wikis
  • Contact Us
    • Ed Tech Consultation
    • Tech Services Consultation
  • Change Your Password
  • Spam & Junk Email
  • IT Policies
  • IT Blog
You are here: Home → Cybersecurity → The Threat of SIM Swapping

The Threat of SIM Swapping

A lot of online services and websites offer users the ability to protect their accounts using two-factor authentication through phone text. This post will go over a way that hackers have found in order to do just that.

A SIM swapping is a technique used by a cyber-criminal in order to take control of accounts that use two-factor authentication. To achieve this goal the attacker takes advantage of the fact that cellphone carriers give their customers the option of porting their old sim card information into a new one if their phone has been lost or stolen.

Hackers exploit this service by pretending to be the legitimate owner of the number and asking for a SIM swap. This leaves the victim exposed to loosing control and access to their accounts as the attacker can now request password changes to the email addresses associated with phone number of the victim and by extension do the same for their other accounts.

In order to mitigate this risk we recommend using an authenticator app with an verification method which generates a temporary password without relying on mobile services.

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to print (Opens in new window)

Related

Filed Under: Cybersecurity

Primary Sidebar

Interesting Videos

Resources

  • We can help with…
  • Professional Development
  • Projects in a Box
  • Workshops
  • I.S. Support
  • Request an Appointment
  • ArcGIS Online
  • Hoonuit online training
  • Qualtrics
  • Poster Printing
  • Request a Wiki
  • Loaner Equipment

Copyright © 2021 · Technology Theme 3.0.0 on Genesis Framework · WordPress · Log in

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.OkNo
You can revoke your consent any time using the Revoke consent button.Revoke cookies