Get a Pentest and security assessment of your IT network.

News

Cybercriminals bypass e-banking protections with fraudulent SIM cards, says Trusteer

Cybercriminals are impersonating victims in order to obtain replacement SIM cards from their mobile carriers, security vendor Trusteer says. The likely explanation for the Trojan’s collection of phone-specific data is that it’s used to obtain a fraudulent SIM card for the victim’s phone number by reporting their phone as stolen. This would allow fraudsters to bypass bank anti-fraud defenses that are based on one-time passwords. Users should run security software that protects their browsing sessions from being tampered with.”]

Source: https://www.csoonline.com/article/2131213/cybercriminals-bypass-e-banking-protections-with-fraudulent-sim-cards–says-trustee.html

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

BlackEnergy exploits recently fixed flaws in Siemens WinCC

News

Google Chrome will block code injection from third-party software within 14 months