What SIM swapping is, and why business should care
SIM swap fraud is back in vogue. We explain what it is, the danger it poses to organizations, and how to guard against such attacks.
10 articles
SIM swap fraud is back in vogue. We explain what it is, the danger it poses to organizations, and how to guard against such attacks.
New iPhones support eSIM technology. We explain what it is and who will soon be using it.
In this edition of the Kaspersky Lab podcast, we discuss a pair of data breaches, a Tor SIM card, a leaky Tea Party AWS server, and more.
David and Jeff discuss Fortnite (again!), the T-Mobile data breach, and how a fish tank helped, in a way, with the development of the modern Internet.
Apple SIM, Google Project Fi and, for example, GigSky are all virtual SIM cards. OK, what’s so virtual about them?
SIM cards can be cloned. How is it possible and what does it have to do with cybercriminals?
Observing the evolution the good old SIM card went through and the results so far.
New allegations against the NSA claim the group hacked into the network of the world’s largest SIM card provider, stealing encryption keys to millions of devices.