SIM Cloning, ID Theft, & Bluetooth Attacks Flashcards
Subscriber Identity Module (SIM Card)
Integrated circuit that securely stores the International Mobile Subscriber Identity (IMSI) number and its related key. This tells the cell tower which phone is connected to which number.
SIM Cloning
Allows two phones to utilize the same service and allows the attacker to gain access to the phone’s data. Once the attacker collects data on you, they can social engineer their way to take over your account and then steal your identity.
What is Bluejacking?
When someone pairs with your Bluetooth device and sends unsolicited messages.
Sending Information
What is Bluesnarfing?
Unauthorized access of information from a wireless device via Bluetooth
Taking Information
How do you protect yourself from Bluetooth attacks?
Turn off your Bluetooth is the best way.
At least turn of discovery mode, and don’t use the default pairing key.