By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Social media mistake can lead to attack that breaches ALL accounts
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Social media mistake can lead to attack that breaches ALL accounts
News

Social media mistake can lead to attack that breaches ALL accounts

News Room
Last updated: 2025/06/28 at 9:07 AM
News Room Published 28 June 2025
Share
SHARE

THERE are some details you just cannot share on social media – or you could be putting yourself at risk of a devastating “SIM swap” attack, experts have warned.

In the wake of the M&S cyberattack in April, where SIM swapping is believed to have played a role, consumers have been warned that the breed of attack could also wreak havoc on their own personal lives.

5

SIM swapping is a form of fraud that is swiftly on the riseCredit: Getty
Person taking a photo of a border collie with a smartphone.

5

Be careful what you post on social mediaCredit: Getty

SIM swapping is a form of fraud that is swiftly on the rise, according to a report published in The Conversation last month, co-authored by computer science professor Alan Woodward and secure systems lecturer Daniel Gardham, both of the University of Surrey.

Attacks rose by a whopping 1,055 per cent in 2024, according to the National Fraud Database.

It has also allegedly been used in the hacking of former Twitter CEO Jack Dorsey in 2019.

“Our mobile phone numbers have become a de facto form of identification, but they can be hijacked for nefarious purposes,” the pair wrote.

People typically have the same phone number for years – even after changing phones, losing their device, or having it stolen.

“When a user buys a new phone, or just a new sim card for a spare device they might have, they might call their service provider to transfer their longstanding mobile number to the new sim card,” experts explained.

“The problem is that the service provider doesn’t know if it is really them calling to transfer the number.

“Hence, they launch into a series of questions to make sure they are who they say they are.”

These security questions are used for all kinds of accounts, and often ask for the same information.

For example, “what is your mother’s maiden name?”, or “…the name of your first pet?”

Huge Global Data Breach: 16 Billion Accounts at Risk

But if someone else can know the answers to those questions after stalking your social media, it leaves you at risk of not only SIM swap fraud but other forms of hacking.

Suddenly, someone else can make and receive calls and SMS messages using your number.

Prof Alan Woodward and lecturer Daniel Gardham, of the University of Surrey

“The rise of social media has made it easier than ever for scammers to piece together what was once considered private information,” experts wrote.

“Suddenly, someone else can make and receive calls and SMS messages using your number.”

That means hackers can make calls at your expense. But it’s not just your phone number that can be stolen.

SIM swapping can be used to breach all your other accounts through the theft of two-factor authentication (2FA) codes.

Security experts recommend all consumers have the 2FA tool switched on with all their accounts.

iPhone Face ID authentication and Apple Card setup.

5

Passkeys are used to log into your online account only when you unlock your phone through your PIN code, fingerprint or face IDCredit: Apple

Instead of just relying on a password, 2FA adds a second factor – like a code from your phone or biometric data like your fingerprint or face ID.

Woodward and Gardham added: “Remember when you created your email, bank account or even online grocery shopping account and you were encouraged to set up two-factor authentication (2FA)?

“You listened, but the system set your ‘second factor’ as your mobile phone number.

“You input your username and password, and it asks for a time-limited code that it sends to you as an SMS message.”

Now, if you have been a victim of SIM swapping – the hackers will receive your security codes instead of you.

This could potentially grant them access to all sorts of accounts, from your social media to your banking app.

Efforts to improve login security have led to the rise of what are known as passkeys… Which are long sequence of random digits called cryptographic keys that are stored on your device, such as a smartphone or computer.

Prof Alan Woodward and lecturer Daniel Gardham, of the University of Surrey

It’s important to note that even with the risks of SIM swapping, 2FA should still be enabled on all your accounts.

In addition to it, however, experts are encouraging the use of passkeys – a passwordless login method that is supposed to be more secure.

Facebook just recently adopted passkeys as a safer alternative to passwords, but companies like Google and Apple have had them for a while.

“Efforts to improve login security have led to the rise of what are known as passkeys,” Woodward and Gardham explained. “Which are long sequence of random digits called cryptographic keys that are stored on your device, such as a smartphone or computer.”

Passkeys are used to log into your online account only when you unlock your phone through your PIN code, fingerprint or face ID.

WHAT ARE PASSKEYS?

Passkeys are the newer, safer passwords, according to tech companies and security experts.

They allow you to log into your accounts using biometrics like your fingerprint or face scan.

You can even use your phone’s passcode.

To sign into a website or app on your phone, all you need to do is unlock your phone.

This also works for websites on PCs and laptops.

If you’re trying to sign into a website on your computer, you just need your phone nearby.

You will be prompted to unlock your phone when trying to log into an account on your computer, which will then grant you access on the PC.

By using unique credentials tied to your phone or other devices, you make your accounts more resistant to phishing and other password-based attacks.

A man using a smartphone receives a warning alert about a cyber attack.

5

SIM swapping can be used to breach all your other accounts through the theft of two-factor authentication (2FA) codesCredit: Getty
SIM card and smartphone SIM tray on blue background.

5

It’s important to note that even with the risks of SIM swapping, 2FA should still be enabled on all your accountsCredit: Getty

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Tesla accelerates launch of Full Self-Driving software in China: report · TechNode
Next Article This Staples FlexFit Desk Converter Is Well-Priced and Reliable
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Bitcoin Price Prediction Experts Reveal: Bitcoin Solaris Could Make Early Investors Rich by 2025
Gadget
Authors call on publishers to limit their use of AI | News
News
Modern tunneladoras are authentic monsters compared to those of 1950. The paradoxical is that they are equally slow
Mobile
The Rafale F5 will not come the empty wings
Mobile

You Might also Like

News

Authors call on publishers to limit their use of AI | News

1 Min Read
News

Red Line extension, quantum computing campus get final zoning approval

6 Min Read
News

Best 3D Printers (2025)

4 Min Read
News

Check Out My Picks For Early Prime Day Laptop Deals From Apple, Microsoft, and More

7 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?