{"id":12145,"date":"2017-06-28T14:00:29","date_gmt":"2017-06-28T19:00:29","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=12145"},"modified":"2017-06-28T14:47:00","modified_gmt":"2017-06-28T19:47:00","slug":"dangers-losing-sim-card","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/dangers-losing-sim-card\/","title":{"rendered":"What Are the Dangers of Losing Your SIM Card?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">In 2017, many American citizens are still unaware that SIM card theft is a booming business. What exactly is a SIM card, you ask? Well, it&#8217;s that little removable card with a unique serial number, located in the back of most Android cell phones. On any SIM card, you&#8217;ll find a myriad of personal information, including your phone contacts, text messages, and even access to other pertinent data, like your banking details.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Basically, inserting your SIM card into another Android phone would allow someone else to impersonate you. It\u2019s easy access to all of your personal information. Identity theft is a huge concern in these situations, whether you&#8217;re dealing with one petty thief or a criminal ring. The following will walk you through the dangers of losing a SIM card.<\/span><\/p>\n<p><b>Read More: <\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/properly-dispose-old-smartphone\/\"><b>How to Properly Dispose of an Old Smartphone<\/b><\/a><\/p>\n<p><b>Some Risks Associated with SIM Card Theft<\/b><\/p>\n<p><span style=\"font-weight: 400;\">There are many, many alarming scenarios that could unfold if your SIM card falls into the wrong hands. At the tamer end of things, the thief could use the SIM card for his or her own personal use. That means, he or she will be making calls and texts \u2014 and you&#8217;ll be footing the bill! Phone companies will usually reverse these fraudulent charges for you, but you need to contact them promptly to report your stolen SIM card.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Exploiting premium-rate phone numbers is another strategy used by SIM card thieves. Generally, the criminals control these hotlines\u2019 accounts. Dialling the number itself is perfectly legal, but the phone charges for calling one are tremendous. So, by using your SIM card to phone these premium numbers, the thieves can steal hundreds of your dollars very quickly.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, SIM card theft can lead to even darker consequences. Recently, in the United Kingdom, there were reported cases of &#8220;SIM swap fraud.\u201d SIM swap fraud attacks banking transactions by disabling the security features that protect customers. By using single-use pin codes and text message alerts, this form of theft allows criminals to access and drain funds from their victims\u2019 checking accounts.<\/span><\/p>\n<p><b>The First Step to Take if Your SIM Card Disappears<\/b><\/p>\n<p><span style=\"font-weight: 400;\">If your SIM card becomes lost or stolen, call your phone company immediately, or visit their nearest outlet. They will need to cancel your SIM card at once so it can&#8217;t be used for malicious purposes. Not acting in time could be extremely costly, and the devastation can&#8217;t always be reversed. After you cancel your card, you can then get a new SIM card.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If your Android&#8217;s SIM card is lost or stolen, you need to act swiftly. These small pieces of plastic contain a huge amount of your personal data.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[3981,9,249],"class_list":["post-12145","post","type-post","status-publish","format-standard","hentry","category-security","tag-card-chip","tag-mobile","tag-security"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/12145","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=12145"}],"version-history":[{"count":0,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/12145\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=12145"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=12145"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=12145"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}