Do be a victim, we try to post updates with all variations of these scams as we come across real clients who have fallen prey to these tricks. Remember, if it’s too good to be true, it probably is.
SIM Hijacking, social engineered theft, your phone is the cornerstone of your life and the keystone for 2-step authentication.
We have had a couple of these cases where a small business was using a cellular line for business and through social engineering a hacker was able to get access to the phone line and diverted it. Which in turn led to multiple other data breeches within this company's digital operations. The phone is the [...]