May 08, 2017
02, the mobile phone seller, confirmed it was the target of hackers that exploited a weakness in a protocol used by telecom networks for two-factor verification. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required. yesSubscribe to our daily newsletter, […]