Can You Be Hacked Through a SIM or eSIM?
By CHRISTIAN STEVENS – April 19, 2025
This thought crossed my mind recently while browsing the Top 100 cybersecurity attacks — and guess what topped the list? Social engineering. It’s one of the easiest and most common ways attackers gain access to someone’s personal information. That got me thinking, especially as I was preparing to travel over the Easter holiday week and needed a SIM card.
In the U.S., I don’t stress too much about whether the SIM card comes from a major brand carrier. But traveling abroad? That’s a different story. You’ve probably seen it — you step off the plane, and suddenly, you’re swarmed by people trying to sell you SIM cards at the airport. I haven’t personally bought one from these folks, but I’ve seen others do it.
Here’s the thing: Although hacking via SIM or eSIM is difficult, it’s not impossible.
How Secure Is a SIM or eSIM, Really?
Traditional SIM cards and newer eSIMs both require remote provisioning by a mobile carrier, which usually involves encrypted communication and authentication. In other words, they’re designed with security in mind. That said, scammers operate in organized networks, so it pays to be careful.
When traveling, ensure you’re getting your SIM from a reputable carrier. Do a little research beforehand or stick to official airport booths and stores. Avoid random QR codes or shady sellers with no credentials.
What Are the Actual Risks?
1. Social Engineering
This is the real threat, not the SIM tech itself. Phones today are gateways to almost everything: Apple/Google Pay, social media, banking, and even smart home devices. If someone gets access to your number, they might intercept 2FA codes or trick systems into giving them access to your accounts.
2. Fake eSIM Activation
If you scan a fake eSIM QR code, you could unknowingly allow someone to redirect or compromise your service. These kinds of attacks are rare and hard to execute thanks to carrier protections, but it’s something to be aware of.
3. SIM Swapping
This is the big one. In a SIM swap scam, an attacker convinces your mobile carrier to transfer your number to their SIM or eSIM. Once they do, they can intercept your texts, calls, and more — especially dangerous if you use SMS-based 2FA.
And here’s the kicker: this kind of attack usually targets your carrier’s customer support process, not the SIM itself.
So… Can You Be Hacked?
Technically, yes, but realistically, it’s not likely, as long as you’re cautious. The real risk isn’t the eSIM or SIM card, it’s how they’re provisioned and managed. Social engineering attacks, phishing attempts, and poor security habits are the real enemies here.
Quick Tips to Stay Safe:
- Use official carrier apps or websites to activate your SIM/eSIM.
- Avoid scanning random QR codes for eSIMs.
- Set a strong PIN for your mobile account.
- Enable two-factor authentication (2FA) — preferably with an authenticator app instead of SMS.
- Watch out for suspicious activity or login alerts.
The bottom line is that you shouldn’t stress over your SIM or eSIM; you should just be smart about how you get it and how you use it. In the digital age, it’s less about technology and more about the human vulnerabilities around it.
Is Home Automation a Curse?
By Christian Stevens – April 11, 2025
In today’s world, we’re constantly chasing convenience. From smartphones to smart homes, we want our lives to be faster, easier, and more connected. And honestly, who can blame us?
Technology has evolved dramatically over the years—goodbye dial-up internet, floppy disks, and flip phones (even though they’re making a stylish little comeback). Now, we have everything from smart TVs and cloud-based security cameras to refrigerators that connect to Wi-Fi. But as much as these innovations make life more seamless, they also bring a new kind of risk: vulnerability to cyber threats.
When Smart Devices Turn Creepy
A few years ago, I came across a chilling news story that stuck with me. A man had hacked into several people’s Ring cameras and was using them to spy on unsuspecting homeowners. In one disturbing instance, he activated the voice control feature while two children were playing in their backyard. As you can imagine, it terrified them—and rightfully so.
Panic spread quickly among users, many of whom felt exposed and helpless. At the time, there was a lot of finger-pointing at the camera company. But here’s the hard truth: the breach didn’t necessarily mean the company had poor security; it meant the hacker had gained access to the home network. And that part? That’s often on us.
The Common Weak Spot: Your Router
Most people use the router provided by their internet service provider and never think twice about its security settings. But here’s the kicker: Every device you connect—your phone, laptop, smart fridge, doorbell camera—has its own IP address.
If someone gains access to your router, they essentially have a master key to your digital life. That’s why securing your home network is the first and most important step in protecting your smart home.
How to Secure Your Smart Home
1. Lock Down Your Router
Change the default admin credentials as soon as your router is set up. Use a strong, unique password. Also, avoid naming your network something obvious like “SmithFamilyWiFi”—it’s best not to reveal personal details.
2. Keep Everything Updated
Yes, it’s a pain. But updates often include crucial security patches. Whether it’s your phone, your security camera, or your smart thermostat, update it regularly.
3. Use Network Segmentation
Set up a separate guest network for visitors. Even better, isolate your IoT (Internet of Things) devices from your primary devices by placing them on their own network. This limits the damage a hacker can do if they breach one system.
4. Use a Trusted VPN
A reputable VPN service encrypts your internet traffic, keeping your browsing activity safe from prying eyes, especially when using public Wi-Fi.
5. Install Antivirus Software
Protect every device you can with antivirus or anti-malware software. Your phone and computer aren’t the only devices worth defending anymore.
So, Is Home Automation a Curse?
Not necessarily. However, this can be avoided if we adopt technology while being mindful of its risks. The conveniences of a connected home are amazing, but they come with responsibility. Think of your smart home like your real home, you wouldn’t leave your doors unlocked, so don’t leave your network wide open either.
Home automation doesn’t have to be a curse if you treat it with the caution it deserves.
How the Current Tariffs Might Affect Cybersecurity
By CHRISTIAN STEVENS – April 4, 2025
As the world continues to grapple with economic uncertainty, one area that often flies under the radar is how these fluctuations—particularly tariffs—can affect cybersecurity. While it may not be immediately obvious, the connection between economic policy and cyber threats is real, and it’s something both individuals and companies should be thinking about now.
Cybersecurity: It’s a Matter of When, Not If
Let’s be clear—cyberattacks are no longer rare, headline-making events. They happen every day. Security protocols fail, sensitive data gets exposed, and hackers evolve faster than most companies can keep up. Cybersecurity is no longer a luxury or a secondary concern—it’s an essential part of doing business in the digital age.
But when the economy tightens and companies are forced to make cuts, security budgets are often among the first to suffer. With tariffs in place—especially on countries heavily involved in global tech manufacturing and services—costs increase, revenue may drop, and companies scramble to stay afloat. In these moments, cybersecurity becomes dangerously deprioritized.
The Human Factor
Why do I believe this is going to become an even bigger issue in the near future? One word: people.
Take the government sector as an example. When someone applies for a position that requires security clearance, their personal and financial history is thoroughly investigated. This is because desperate or financially unstable individuals are more likely to be manipulated, bribed, or blackmailed.
Now, contrast that with the private sector. Very few companies go to such lengths when screening employees, even those with access to sensitive systems or data. As the economy struggles—job losses mount, personal debt rises, and financial insecurity becomes widespread—the risk of insider threats and social engineering attacks also increases.
Retaliation Risks and Ransomware Spikes
Another layer to consider is global retaliation. If tariffs are imposed broadly or perceived as aggressive, the nations affected may not sit idly by. While military conflict is unlikely, cyber retaliation is both discreet and effective. America’s infrastructure, already a tempting target for adversaries, becomes even more vulnerable during these times of economic fragility.
In parallel, we may also see a surge in ransomware and other forms of cybercrime. As poverty and desperation rise, more individuals may turn to illicit digital activities as a means of survival. And because cybercrime can be perpetrated remotely with minimal resources, it’s an attractive option for those with few resources.
Where Do We Go From Here?
That’s the hard question. The economic strain caused by tariffs and inflation is real, but security can’t be an afterthought. Companies need to rethink their approach to cybersecurity, investing in not just technology but also employee training, internal vetting processes, and contingency planning.
Ignoring the ripple effects of global economic decisions is no longer an option. If we want to be prepared for what’s coming, we need to start by understanding the true cost of insecurity in an unstable world.