Two-factor via your mobile phone – should you stop using it?

Our friends over at The Register just documented yet another real-world example of a cybercrime known as SIM swapping. In its most up-front form, here’s the sort of thing that happens.

Read full news article on Naked Security

 


Date:

Categorie(s):