
What is SIM-swap fraud and what are the signs? - BBC
Sep 6, 2025 · SIM-swapping fraud occurs when criminals gain control of a victim's mobile phone number by tricking the network provider into transferring it to a device controlled by the fraudster.
How to Spot a SIM-Swap Attack (and What to Do Next) | Lifehacker
Jun 6, 2024 · SIM swaps are a serious security threat: Find out how to protect yourself and what to do if you get targeted.
How to protect yourself from SIM swap fraud - Vodafone
Apr 30, 2025 · Vodafone has put enhanced security checks and training in place to combat SIM swap fraud, but there are still some crucial precautions that everyone needs to take.
What are SIM swaps and porting fraud, and how are we working
Jan 12, 2022 · SIM swaps and porting fraud are on the rise and, if left unchecked, can lead to identity theft and serious financial crime.
SIM card & eSIM - T-Mobile
The SIM card is your device's ticket to the T-Mobile network! Learn how to buy one, install or replace it, and change or activate a SIM card/eSIM.
Activating and using your SIM - O2
Oct 22, 2025 · Get all the information you need to manage your SIM – how to activate your SIM, how to unblock your phone and what to do if your SIM is lost, stolen or damaged.
Qu’est-ce qu’un SIM swap et comment s’en protéger?
Jan 13, 2020 · Bien qu’elle existe depuis plusieurs années, la fraude par carte SIM connue sous le nom de « SIM swap » ou « transfert de SIM » fait beaucoup parler d’elle ces derniers temps. Voici en ...
SIM Swap - Lebara
Shop SIM only deals UK Add-Ons Top Up Roaming Add-Ons Student Offers Free SIM How To Activate your SIM Activate Internet Check your balances Keep Your Existing Number Access your voicemail …
How do I do a SIM Swap? - Help & Support - MTN South Africa
Learn how to perform a SIM swap with MTN South Africa, including transferring your phone number to a new SIM card and self-service options.
SIM swap attack - Wikipedia
A SIM swap attack (also known as port-out scam, SIM splitting, [1] simjacking, and SIM swapping) [2] is a type of account takeover fraud that generally targets a weakness in [ [Multi-factor authentication …