Unibeam Glossary

  • B

    • Baiting

      Baiting is a trick where attackers lure you into giving up personal or sensitive information by offering something tempting in return. It could be a "free download," a fake prize, or even a USB drive left lying around. Once you take the bait, you might end up with malware on your device or accidentally sharing your login details. It’s a sneaky tactic, but being cautious and verifying offers can help you avoid the trap.

    • Biometric Authentication

      Biometric authentication uses unique physical traits, like your fingerprint, face, or voice, to confirm your identity. It’s like using something you are instead of something you know (like a password). Since your biometrics are hard to fake or steal, this method adds a strong layer of security. You’ve probably used it to unlock your phone or access secure apps—it’s fast, convenient, and personal.

    • Branded Calls

      Branded calls display the identity of the business calling you, like showing the company’s name, logo, or reason for the call on your screen. This makes it clear who’s reaching out, so you’re less likely to ignore it or mistake it for spam. For businesses, it’s a way to build trust and improve customer engagement. It’s like putting a friendly face on a phone call!

  • C

    • Caller ID Spoofing

      Caller ID spoofing is when someone fakes the phone number that shows up on your caller ID. Scammers often use it to make a call look like it’s coming from a trusted source, like your bank or a local business. The goal? To trick you into answering and sharing sensitive information. If a call feels off, it’s always smart to hang up and call back using a number you know is legit.

    • Customer Authentication Methods

      Customer authentication methods are the tools businesses use to confirm someone is who they claim to be. These can range from passwords and PINs to more advanced options like biometric scans (fingerprints or facial recognition), SMS codes, or hardware tokens. The goal is to strike a balance between security and convenience. Each method has its strengths, and many companies combine them to provide extra protection, like using two-factor authentication (2FA).

  • D

    • Deepfake Technology

      Deepfake technology uses artificial intelligence to create hyper-realistic fake videos, images, or audio. It can mimic a person’s appearance, voice, or actions so convincingly that it’s hard to tell it’s fake. While it has creative uses in movies and entertainment, it’s also a tool for spreading misinformation or committing fraud. Being aware of deepfakes and verifying content from trusted sources can help you avoid being misled.

    • Device Identifiers

      Device identifiers are unique codes or numbers assigned to a device, like your smartphone, tablet, or computer. These can include things like IMEI numbers, MAC addresses, or device-specific IDs. They help apps, networks, and services recognize your device for things like security, personalization, or tracking. Think of it as your device’s fingerprint—it’s how systems know it’s really your device accessing them.

  • H

    • Hardware Tokens

      Hardware tokens are small, physical devices that provide an extra layer of security for logging into accounts or systems. They generate one-time codes or connect directly to your device, ensuring only you can access sensitive information. Unlike passwords, which can be hacked or stolen, hardware tokens are harder to compromise because you need to have the actual device in hand. They’re a simple, effective tool for keeping things secure.

    • Hardware-Based Authentication

      Hardware-based authentication relies on a physical device, like a security key or smart card, to verify your identity. Instead of just typing a password, you use the hardware to prove you’re authorized to access an account or system. It’s a strong and secure method because someone would need to steal the actual device—not just guess a password—to break in. It’s a practical way to boost security for sensitive data or systems.

    • Hardware-Based MFA

      Hardware-Based Multi-Factor Authentication (MFA) uses a physical device, like a security key or token, as one of the authentication steps. Alongside something you know (like a password) or something you are (like a fingerprint), the hardware adds a robust layer of protection. It’s especially valuable because the device must be physically present, making it much harder for hackers to bypass. This approach is trusted for securing sensitive accounts and data.

    • Hardware-Based Security

      Hardware-based security uses physical devices to protect systems and data, like secure chips, tokens, or specialized hardware modules. Unlike software-based solutions, which can be vulnerable to remote hacking, hardware adds a tough-to-breach layer because it requires physical access to compromise. It’s often used in areas where high security is essential, like encryption, authentication, and secure data storage. Think of it as locking your valuables in a safe rather than just hiding them behind a password.

    • HMAC-Based One-Time Passwords (HOTP)

      HMAC-Based One-Time Passwords (HOTP) are unique, single-use codes generated using a cryptographic algorithm and a shared secret key. Unlike time-based one-time passwords (TOTP), HOTPs remain valid until they’re used, making them flexible for certain authentication scenarios. They’re commonly used in secure login systems, like two-factor authentication (2FA), to ensure that even if someone steals your password, they still can’t access your account without the one-time code. It’s a simple but powerful way to enhance security.

  • I

    • Identity Verification Compliance

      Identity verification compliance means meeting legal and regulatory standards for confirming a person’s identity. It’s often required in industries like banking, healthcare, and telecommunications to prevent fraud, money laundering, and unauthorized access. Compliance ensures that businesses use reliable methods—such as government-issued IDs, biometrics, or multi-factor authentication—to verify identities securely. By following these rules, companies not only protect their customers but also avoid hefty fines and legal issues.

    • Identity Assurance Level

      Identity Assurance Level (IAL) measures how confidently a system can verify that someone is who they claim to be. It’s often ranked in tiers, from basic verification (like just entering an email) to more robust methods, such as government ID checks or biometrics. Higher levels mean stricter checks, reducing the risk of fraud or impersonation. Businesses choose an IAL based on the sensitivity of what they’re protecting—higher stakes require higher assurance.

    • Identity Check Authentication

      Identity check authentication is the process of confirming that someone is truly who they say they are. This can involve methods like passwords, biometrics (fingerprints or facial recognition), or one-time codes sent to a trusted device. It’s often used during account sign-ins, online transactions, or accessing secure systems. The goal is to protect sensitive information by ensuring only authorized users can get in. Think of it as a digital ID check at the door.

    • IoT Security

      IoT security protects Internet of Things (IoT) devices—like smart thermostats, cameras, or connected cars—from cyber threats. These devices often have less built-in security, making them an easy target for hackers. Effective IoT security includes strong passwords, regular software updates, and secure communication between devices. It’s about keeping the smart world safe so your connected devices don’t become a weak link in your network.

  • L

    • Low-Friction Security

      Low-friction security strikes a balance between keeping systems safe and making access easy for users. It’s all about reducing the hassle—like fewer passwords to remember or seamless authentication methods—without sacrificing protection. Examples include biometric logins or passwordless authentication, where security works in the background. The goal is to keep things secure while ensuring users don’t feel burdened or slowed down. It’s security that works with you, not against you.

  • M

    • MFA (Multi-Factor Authentication)

      Multi-Factor Authentication (MFA) adds extra layers of security by requiring more than just a password to verify your identity. It combines two or more factors: something you know (like a password), something you have (like a security token), or something you are (like a fingerprint). Even if one factor is compromised, the others keep your account protected. It’s a simple but powerful way to make life harder for hackers and easier for peace of mind.

    • Mobile Authentication

      Mobile authentication uses your smartphone or mobile device to verify your identity when accessing accounts or services. This can include methods like receiving a one-time code via SMS, using a fingerprint or face scan, or tapping a security key linked to your phone. It’s convenient because your phone is always with you, and it adds an extra layer of security by tying authentication to something physical. It’s how your mobile becomes your digital key.

    • Multi-Layer Authentication

      Multi-layer authentication adds multiple security checks to verify your identity, creating a more robust defense against cyber threats. Unlike single or two-factor authentication, it combines several layers, like passwords, biometrics, and hardware tokens, to make unauthorized access nearly impossible. Each layer acts as a barrier, so even if one is compromised, others remain secure. It’s a comprehensive approach to keeping your accounts and systems safe.

    • MSISDN

      MSISDN (Mobile Station International Subscriber Directory Number) is the technical term for your mobile phone number. It’s what identifies your device on a network and allows you to make calls, send texts, or use mobile data. Think of it as your phone’s public-facing address, connecting you to the rest of the world. It’s managed by your mobile operator and tied to your SIM card, making it a key part of your mobile identity.

  • N

    • NIST SMS 2FA

      NIST SMS 2FA refers to guidelines from the National Institute of Standards and Technology (NIST) about using text messages (SMS) for two-factor authentication (2FA). While SMS 2FA adds an extra layer of security, NIST has noted its vulnerabilities, like SIM swapping or interception. Their guidance encourages moving toward stronger methods, such as app-based authentication or hardware tokens. It’s about making sure your accounts stay secure as threats evolve.

    • Number Verify API

      A Number Verify API is a tool that checks if a phone number is valid, determines its type (like mobile or landline), and identifies its carrier and location. Businesses use it to ensure they’re contacting real, active numbers, which helps reduce fraud and improve communication efficiency. For example, services like Numverify offer global phone number validation, providing detailed information to keep your contact lists accurate and up-to-date.

  • O

    • One-Time Passwords

      A one-time password (OTP) is a unique code that you can use only once to verify your identity, usually during login or a transaction. It’s sent to you via SMS, email, or an authentication app and expires quickly for added security. Unlike regular passwords, OTPs are dynamic, making them harder for attackers to steal or reuse. It’s a quick and simple way to add an extra layer of protection.

    • OTP Interception

      OTP interception is when a hacker steals a one-time password (OTP) intended for you, often through techniques like SIM swapping or phishing. Once they have the OTP, they can bypass security measures and access your accounts. It’s a growing threat, especially with SMS-based OTPs. Using more secure methods, like authentication apps or hardware tokens, can help protect you from these attacks.

  • P

    • Passwordless Authentication

      Passwordless authentication lets you log in without needing a password. Instead, it uses methods like biometric scans (fingerprints or face recognition), magic links sent to your email, or one-time codes on your phone. It’s more secure than traditional passwords, which can be stolen or guessed, and it’s easier for you since there’s nothing to remember. It’s the future of secure, hassle-free access.

    • Phishing Attacks

      Phishing attacks are scams where hackers trick you into sharing sensitive information, like passwords or credit card numbers. They often come as fake emails or messages pretending to be from trusted sources, like your bank or a well-known company. The goal is to make you click a malicious link or provide personal details. Staying cautious—like double-checking email addresses and avoiding suspicious links—can help you avoid getting hooked.

    • Phishing-Resistant MFA

      Phishing-resistant multi-factor authentication (MFA) is designed to protect against even the most sophisticated phishing attacks. Unlike traditional methods that rely on SMS codes or passwords, it uses stronger options like hardware security keys or cryptographic authentication. These methods ensure that login credentials can’t be intercepted or reused by attackers. It’s a smarter, more secure way to keep your accounts safe in today’s threat-filled digital world.

  • S

    • Seamless Authentication

      Seamless authentication lets users log in or verify their identity effortlessly, without interrupting their experience. It often uses technologies like biometrics, token-based authentication, or background device checks to keep security invisible yet effective. The goal is to balance strong protection with ease of use, so users don’t feel bogged down by extra steps. It’s security that works behind the scenes, keeping things safe and simple.

    • Security Keys

      Security keys are physical devices, like USB sticks or NFC-enabled tools, that provide an extra layer of security for your accounts. They’re used in two-factor authentication (2FA) or passwordless logins, requiring you to physically connect or tap the key to verify your identity. Since they can’t be intercepted remotely, security keys are one of the most reliable ways to protect against phishing and hacking attempts. It’s like having a high-tech key for your digital locks.

    • Signs of SIM Swap

      A SIM swap attack can show up in several warning signs. You might suddenly lose cell service, like being unable to make calls or send texts, or receive unexpected messages about changes to your account. If you’re locked out of your accounts or see unfamiliar login activity, it’s time to act fast. These are red flags that someone might have hijacked your number. Contact your carrier immediately if you suspect a SIM swap.

    • Silent Authentication

      Silent authentication verifies your identity in the background without requiring you to take any action. It uses data like your device ID, location, or behavior patterns to confirm it’s really you. This approach minimizes interruptions while maintaining security, making it ideal for things like app logins or online transactions. It’s security that works quietly, so you can focus on what you’re doing.

    • SIM Card Swap Scam

      A SIM card swap scam is when a fraudster tricks your mobile carrier into transferring your phone number to a SIM card they control. Once they take over your number, they can intercept calls and texts, including one-time passwords (OTPs), to access your accounts. Warning signs include losing phone service unexpectedly or receiving notifications about changes to your account. If this happens, contact your carrier immediately to secure your number.

    • SIM Cloning

      SIM cloning is when someone duplicates the data on your SIM card to create a copy that can intercept your calls, texts, and data. This lets attackers impersonate you, potentially gaining access to sensitive accounts that use your phone for authentication. Signs of SIM cloning include unexpected disruptions in your phone service or strange activity on your accounts. Protecting your SIM with carrier-level security features can help prevent cloning.

    • SIM Fraud

      SIM fraud happens when attackers manipulate your SIM card or its details to gain access to your phone number. Common forms include SIM swapping, cloning, or unauthorized activation. Once they control your number, scammers can intercept calls, texts, and even bypass two-factor authentication (2FA) to access your accounts. Signs of SIM fraud include losing phone service or seeing unusual account activity. Acting quickly by contacting your carrier can minimize damage.

    • SIM Hijacking

      SIM hijacking, also known as SIM swapping, is when an attacker takes control of your phone number by convincing your carrier to transfer it to their SIM card. Once hijacked, they can intercept calls and texts, including one-time passwords, to access your accounts. Warning signs include sudden loss of phone service or unauthorized activity in your accounts. Protecting your number with a PIN or additional carrier security measures can help prevent this attack.

    • SIM Swap

      A SIM swap is when a fraudster transfers your phone number to a new SIM card they control, often by tricking your mobile carrier. Once they take over your number, they can intercept calls and texts, including one-time passwords (OTPs), to access your accounts. Signs include losing phone service or receiving unexpected account notifications. To protect yourself, use carrier-level protections like PINs and monitor your accounts for suspicious activity.

    • SIM Swap Attack

      A SIM swap attack is when a hacker fraudulently transfers your phone number to a SIM card they control. By gaining access to your number, they can intercept calls and texts, bypass two-factor authentication (2FA), and take over your accounts. Signs of a SIM swap attack include losing phone service unexpectedly or unusual activity on your accounts. To stay safe, secure your carrier account with a PIN and be cautious of phishing attempts.

    • SIM Swap Scam

      A SIM swap scam involves tricking your mobile carrier into transferring your phone number to a fraudster’s SIM card. Once they control your number, scammers can intercept texts and calls, including one-time passwords (OTPs), to gain access to your accounts. Warning signs include losing phone service or receiving unexpected account notifications. To prevent this, set up a PIN or additional security with your carrier and stay alert to suspicious account activity.

    • SIM Swapping

      SIM swapping is when an attacker fraudulently transfers your phone number to their SIM card. By doing this, they can intercept calls, texts, and one-time passwords (OTPs), allowing them to access your accounts or steal personal information. Signs of SIM swapping include losing phone service or unexpected changes to your accounts. To protect yourself, use carrier-level protections like PINs and monitor your accounts for unusual activity.

    • SIM-Based Authentication

      SIM-based authentication uses your SIM card to verify your identity during logins or transactions. It works by sending one-time passwords (OTPs) or relying on secure carrier networks to confirm that the device is linked to your phone number. It’s a convenient way to authenticate, but it can be vulnerable to attacks like SIM swapping. Adding extra layers of security, such as multi-factor authentication (MFA), helps make it more reliable.

    • SIM-Based Technology

      SIM-based technology leverages the SIM card in your mobile device for various functions, from connecting to carrier networks to enabling secure authentication. It’s widely used for tasks like verifying your identity, encrypting data, and managing subscriptions. This technology plays a crucial role in mobile communication and security, acting as a bridge between your device and the network. Its versatility makes it foundational for modern mobile ecosystems.

    • Smishing

      Smishing is phishing done through text messages (SMS). Scammers send fake messages pretending to be from trusted sources, like your bank or a delivery company, to trick you into clicking a malicious link or sharing personal information. These messages often create a sense of urgency, like warning about account issues or missed packages. To stay safe, avoid clicking on links in suspicious texts and verify messages directly with the sender.

    • SMS Phishing

      SMS phishing, or smishing, is a type of scam where attackers use fake text messages to steal personal information or trick you into clicking malicious links. These messages often pretend to be from trusted organizations, like your bank or a delivery service, and create urgency to prompt quick action. Examples include fake account warnings or package delivery notices. To avoid falling for SMS phishing, don’t click on suspicious links and verify messages directly with the organization.

    • Social Engineering

      Social engineering is a tactic where attackers manipulate people into giving up sensitive information or access. Instead of hacking systems, they trick individuals using scams like phishing emails, fake phone calls, or in-person deception. The goal is to exploit trust or fear to steal passwords, financial details, or other valuable data. Staying alert, verifying requests, and questioning unexpected interactions can help you avoid these manipulative attacks.

    • Spear Phishing Attacks

      Spear phishing attacks are targeted scams aimed at specific individuals or organizations. Unlike generic phishing, these attacks are highly personalized, using details like your name, role, or company to make the message look legitimate. The goal is often to steal sensitive information, like login credentials, or to install malware. To protect yourself, be cautious with unexpected emails, verify senders, and avoid clicking on suspicious links or attachments.

    • Spoofing

      Spoofing is when attackers fake their identity to trick you into trusting them. It can involve disguising an email address, phone number, website, or even a caller ID to appear as someone legitimate, like your bank or a coworker. The goal is to steal sensitive information or spread malware. To stay safe, double-check suspicious communications and use secure channels to verify identities before sharing any details.

  • T

    • Time-Based One-Time Passwords (TOTP)

      Time-Based One-Time Passwords (TOTP) are unique, short-lived codes generated based on the current time and a shared secret key. They’re typically used in authentication apps like Google Authenticator or Authy for secure logins. Unlike static passwords, TOTPs change every 30-60 seconds, making them harder for attackers to exploit. It’s a simple yet effective way to enhance account security.

  • U

    • Unauthorized Login

      An unauthorized login happens when someone accesses your account or system without your permission. This could be due to stolen credentials, weak passwords, or security vulnerabilities. Signs include unexpected login notifications, changes to your account, or unfamiliar activity. Protecting your accounts with strong passwords, multi-factor authentication (MFA), and monitoring for suspicious activity can help prevent unauthorized logins.

  • W

    • Whaling

      Whaling is a type of phishing attack that targets high-level executives, like CEOs or CFOs, with highly personalized scams. These attackers aim to steal sensitive information, like financial data, or trick the victim into approving fraudulent transactions. Because the stakes are higher, whaling emails often appear extremely legitimate, mimicking trusted contacts or urgent business matters. Staying vigilant and verifying unusual requests can help protect against these sophisticated attacks.