What SIM swapping is, and why business should care
SIM swap fraud is back in vogue. We explain what it is, the danger it poses to organizations, and how to guard against such attacks.
8 articles
SIM swap fraud is back in vogue. We explain what it is, the danger it poses to organizations, and how to guard against such attacks.
New iPhones support eSIM technology. We explain what it is and who will soon be using it.
In this edition of the Kaspersky Lab podcast, we discuss a pair of data breaches, a Tor SIM card, a leaky Tea Party AWS server, and more.
David and Jeff discuss Fortnite (again!), the T-Mobile data breach, and how a fish tank helped, in a way, with the development of the modern Internet.
In the first part of our story we covered the history of SIM cards. Now let us get down to their security. One of the first vulnerabilities in SIM cards that was
A SIM card, or Subscriber Identity Module is a familiar element of a mobile phone. It can be easily swapped or replaced, yet, it was not born at the same
The latest in a long line of whistleblower Edward Snowden’s National Security Agency revelations may be among the most shocking: that the NSA and its British counterpart, GCHQ, allegedly compromised