SIM swapping involves an attacker convincing a victims’s mobile service provider they themselves are the victim, and then requesting the victim’s phone number be switched to a device of their choice. This is because SMS is renowned for having infamously poor security, leaving it open to a host of different attacks.įor example, SIM swapping has been demonstrated as a way to circumvent 2FA. Major vendors such as Microsoft have urged users to abandon 2FA solutions that leverage SMS and voice calls. Yet many critical online services in Australia still use SMS-based one-time codes, including myGov and the Big 4 banks: ANZ, Commonwealth Bank, NAB and Westpac.Ī computer can guess more than 100,000,000,000 passwords per second. Partnersĭeakin University provides funding as a member of The Conversation AU. Robin Doss does not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment. ![]() The work has been supported by the Cyber Security Research Centre Limited whose activities are partially funded by the Australian Government’s Cooperative Research Centres Programme. Research Director, Centre for Cyber Security Research and Innovation, Deakin University Research Fellow, Centre for Cyber Security Research and Innovation, Deakin UniversityĬyberCRC Research Fellow, Centre for Cyber Security Research and Innovation (CSRI), Deakin University
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |