Skip to content

Search results

What is a SIM swap attack? 

In today’s digital era, the prevalence of cyber threats is undeniable. One such threat is a SIM swap attack. Also known as SIM splitting, SIM jacking, or SIM hijacking, a SIM swap attack poses significant risks. But what exactly is a SIM swap attack, are you vulnerable to it, and what measures can you take

SIM swapping continues to rise: How to defend against it

Although most consumers are aware of traditional identity theft, many are unaware of the many techniques fraudsters use to steal millions of dollars from their accounts daily. According to a recent public service announcement, the Internet Crime Complaint Center received 1,611 SIM swapping complaints in 2021, an alarming increase from the reported 320 complaints from

SIM swap fraud is on the rise. Are your users protected?

Let’s face it – even with the strongest of passwords, two-factor authentication, or never getting reeled in by a phisher – anyone can be a victim of a cyberattack. If Jack Dorsey can get his Twitter account hacked – how exposed are your users? As the global adoption of digital banks, wallets, and cryptocurrency skyrockets,

SIM Swap Detection: A Key Factor in Fraud Prevention

What is SIM Swapping? SIM swapping is essentially phone number theft. Fraudsters find out personal information about a victim, and then use that information to convince the victim’s wireless carrier to port their phone number over to a SIM card in the fraudster’s possession. Most of us have our phone numbers linked to our bank,

How Telesign Protects Transactions from SIM Swap Fraud

SIM Swap is one of the most damaging types of fraud imaginable because it gives fraudsters control of a user’s device. Accounts can be drained, products purchased, money transferred all in the matter of a couple hours. In order to understand how Telesign fights against SIM Swap fraud, it’s important to know how the scheme

SIM Swap: The Gateway Hack

Telesign to offer SIM Swap protection in US, Canada, UK, Nigeria, South Africa, France and Australia You’ve probably heard of the term ‘Ô’gateway drug.’ It’s a piece of escalation theory that states that someone who tries alcohol, tobacco or some other minor drug will sooner or later be addicted to crack. It’s generally used as

SIM SWAP: The Ultimate Con

America loves a good con. Think of some of most beloved movies of all time: Catch Me If You Can, The Sting, Ocean’s 11. White Men Can’t Jump took place on the Venice Beach basketball courts, right in Telesign’s backyard. The point is we love a suave, fast talking, good looking anti-hero that pulls off

Remember: Only You Can Prevent SIM Swap Fraud

“Hi there, I’m hoping you can help me out.”It’s the beginning of a standard customer service call. One of your customers has an issue or slight inconvenience they are trying to solve. Fortunately, the person on the other end of the line is a people pleaser, trained to assist as conveniently as possible. More often

LAPSUS$ shows how SIM-swap attacks threaten enterprises as much as consumers

From social media takeovers to million-dollar crypto heists, SIM-swapping has become a mainstream attack vector. About every week another article hits our timelines on how an unsuspecting person became the latest victim. Last year alone, SIM-swap attacks cost Americans more than $68 million, and the number of reported incidents grew by more than 400%. Earlier

Telesign’s services 11/19

November 2019 Previous versions: Previous version may be found here: September 2017, January 2018 , February 2018, March 2018, October 2018, February 2019, June 2019 This list of Services forms part of Telesign’s Terms of Service (or if your company has a separate agreement with Telesign for the provision of services from Telesign to you,

Lawful bases for processing personal data at Telesign

Introduction Telesign processes personal data to deliver our products and services to our customers. To do so we rely most commonly on the lawful basis of either consent or legitimate interest.  We obtain personal data in two ways, either (1) directly from individuals; or (2) via third party providers. ‍ (1) Personal data obtained directly

Telesign’s services 03/22

March 2022 This list of Services forms part of Telesign’s Terms of Service (or if your company has a separate agreement with Telesign for the provision of services from Telesign to you, part of that separate agreement (in either case, the “Agreement”).  Any capitalized terms herein shall have the meaning set out in the Agreement.