SIM Hijacking, social engineered theft, your phone is the cornerstone of your life and the keystone for 2-step authentication.
We have had a couple of these cases where a small business was using a cellular line for business and through social engineering a hacker was able to get access to the phone line and diverted it. Which in turn led to multiple other data breeches within this company's digital operations. The phone is the [...]