Top
image: Naked Security

Two-factor via your mobile phone – should you stop using it?

July 12, 2017

Our friends over at The Register just documented yet another real-world example of a cybercrime known as SIM swapping.

In its most up-front form, here’s the sort of thing that happens.

A crook walks into a mobile phone shop, lets himself get talked into a top-of-the-range new mobile phone to replace the one he says he just lost.

Read More on Naked Security