SIM cards: attack of the clones
SIM cards can be cloned. How is it possible and what does it have to do with cybercriminals?