Source |
CSO |
Identifiant |
1025240 |
Date de publication |
2019-02-13 03:00:00 (vue: 2019-02-13 13:01:08) |
Titre |
What is a man-in-the-middle attack? How MitM attacks work and how to prevent them |
Texte |
A man-in-the-middle (MitM) attack is when an attacker intercepts communications between two parties either to secretly eavesdrop or modify traffic traveling between the two. Attackers might use MitM attacks to steal login credentials or personal information, spy on the victim, or sabotage communications or corrupt data.[ Keep up with 8 hot cyber security trends (and 4 going cold). Give your career a boost with top security certifications: Who they're for, what they cost, and which you need. | Sign up for CSO newsletters. ]
“MITM attacks are a tactical means to an end,” says Zeki Turedi, technology strategist, EMEA at CrowdStrike. “The aim could be spying on individuals or groups to redirecting efforts, funds, resources, or attention.” |
Envoyé |
Oui |
Condensat |
aim are article attack attacker attackers attacks attention between boost career certifications: click cold communications corrupt cost could credentials crowdstrike cso cyber data eavesdrop efforts either emea end full funds give going groups here hot how individuals information intercepts keep login man means middle might mitm modify need newsletters parties personal please prevent read redirecting resources sabotage says secretly security sign spy spying steal strategist tactical technology them they top traffic traveling trends turedi two use victim what when which who work your zeki “mitm “the ”to |
Tags |
|
Stories |
|
Notes |
|
Move |
|