Select Page

If your cell phone can be your go-to device for checking your own email, having to pay the costs, or uploading to social media, you’re one of many.

If your cell phone can be your go-to device for checking your own email, having to pay the costs, or uploading to social media, you’re one of many.

Therefore imagine that their mobile phone out of the blue stops employed: no data, no texts, no telephone calls.

Next imagine getting an urgent notice from your cell company that your particular SIM card has become triggered on a unique unit. What’s going on? These maybe indications that a scammer features pulled a SIM card trade to hijack your cell phone number.

So how do fraudsters accomplish a SIM card swap like this? They could contact the cellular phone provider and say your own mobile is lost or hurt. Chances are they ask the provider to trigger an innovative new SIM card connected to your own number on a fresh telephone — a cell phone they possess. (more…)