Sunday, 21 June 2015

Man in the Middle Attack

A man-in-the-middle attack is one in which the attacker secretly intercepts and relays messages between two parties who believe they are communicating directly with each other. It’s a form of eavesdropping but the entire conversation is controlled by the attacker, who even has the ability to modify the content of each message. MIM attacks pose a serious threat to online security because they give the attacker the ability to capture and manipulate sensitive information in real-time while posing as a trusted party during transactions, conversations, and the transfer of data. Every important data will be  lose when someone create a middle attack, so secure your system.Everything in my blog is only for education purpose.

No comments:

Post a Comment