According to Ravichandran, it is simple for hackers to send messages to consumers in order to gain access and pass as another person. “Just as it is simple for a hacker to redirect a cell phone number from one carrier to another,” he adds.
According to Ravichandran, it is simple for hackers to send messages to consumers in order to gain access and pass as another person. “Just as it is simple for a hacker to redirect a cell phone number from one carrier to another,” he adds.