MITM

3 1 0
                                    

MITM Man in the Middle Attack

A Man-in-the-Middle (MITM) attack happens when a hacker inserts themselves between a user and a website. This kind of attack comes in several forms. For example, a fake banking website may be used to capture financial login information. The fake site is “in the middle” between the user and the actual bank website.

Attackers have many different reasons and methods for using a MITM attack. Typically, they’re trying to steal something, like credit card numbers or user login credentials. Sometimes they’re snooping on private conversations, which might include trade secrets or other valuable information.

You've reached the end of published parts.

⏰ Last updated: Jun 29, 2020 ⏰

Add this story to your Library to get notified about new parts!

Cyber Security AcronymWhere stories live. Discover now