SIM cards: attack of the clones
In theĀ first partĀ of our story we covered the history of SIM cards. Now let us get down to their security. One of the first vulnerabilities in SIM cards that was … Continue reading SIM cards: attack of the clones