Expert gives advice on protecting SIM-card from fraudsters


Recently, user demands for anonymity and security in the digital world have only increased. In this regard, SIM cards play a key role in ensuring user security. Anna Kashnitskaya, founder of the Russian technology company Unisimka, told Izvestia about ways to help protect SIM cards from fraudsters.
According to her, one of the most effective and reliable methods of protecting a SIM card from intruders is to install a code. If the phone goes missing, the first step is to call your operator and try to block the SIM card or do it yourself with a code. If the fraudsters get the device, they will likely pull the SIM card and insert it into another phone. However, having a PIN code will make it harder for them to access the number, protecting all the applications associated with it.
In addition, the specialist advises issuing the SIM card on a valid passport, as this is a secure method that will make it easier to block and then recover the SIM card if the phone is stolen or lost.
It is also important to enable the SIM card re-issue prohibition. In some situations, it is possible to set up a unique password or special codeword to re-issue the SIM card. This is a reliable method that provides an additional level of control over the number, the specialist added.
Kashnitskaya recommends activating two-factor authentication, which will protect social networks and messengers from fraudsters, even if they gain access to the SIM card or phone. The first stage of authentication requires a digital password, while the second stage can be accomplished using a variety of methods - biometrics, a code from an SMS or email.
"The most reliable method is a separate authentication app that automatically creates a digital code or QR code for re-authorization. Such an application can be used even in the absence of mobile communication", - summarized the expert.
Earlier, on December 13, the author of the Solar appScreener product Daniil Chernov told Izvestia about fraud schemes through geolocation on a smartphone. According to him, fraudsters can develop this fraud scheme using vulnerabilities in the iPhone or Android operating systems. For example, a trojan can be installed on the device, which transmits geolocation information to the attacker.
Переведено сервисом «Яндекс Переводчик»