Guide | How To Protect Yourself from SIM-Swapping Attacks

The associated guide may contain user-generated or external content.

Ink

Administrator
Thread author
Verified
Jan 8, 2011
22,490
Read more: How to Protect Yourself From SIM-Swapping Attacks - [How-To-Geek]
You think you’re making all the right moves. You’re smart with your security. You have two-factor authentication enabled on all your accounts. But hackers have a way to bypass that: SIM swapping.

It’s a devastating method of attack with dire consequences for those who fall victim to it. Fortunately, there are ways to protect yourself. Here’s how it works, and what you can do.
  • What Is a SIM-Swap Attack?
  • Who Is Most at Risk?
  • How Do You Know an Attack Has Taken Place?
  • How Should You Respond?
  • How to Protect Yourself From an Attack
 

Ink

Administrator
Thread author
Verified
Jan 8, 2011
22,490
No new news ;)
Same also for old SMS-TAN for banking.
This might be the best solution for now (see quoted text). Otherwise use a different number for any Financial-related SMS-based authentication where app-based 2FA are not readily available. Although it's not viable for everyone, as not everyone has a Dual-SIM phone or wanting 2 phone numbers.
Create a PIN or Extra Password with Your Carrier
You can call your carrier directly and create an additional PIN code to protect your account. You can also request an extra password, too, depending on the carrier. Making the PIN and password as unique and removed from your identity as possible is important.
Source: What Is Sim Swapping and How Can You Prevent It? | Blocks Decoded

Carriers should provide have better measures to prevent fraudulent attacks.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top