Posts

Showing posts from June, 2017
How To Prevent  MITM  Attacks? MITM attacks can really overwhelm you just by hearing its basic concept, but that doesn’t mean they are impossible to avoid. PKI technology can help protect you from some of the types of attacks we discussed above. S/MIME Secure/Multipurpose Internet Mail Extensions, or S/MIME for short, encrypts your emails  at rest or in transit , ensuring only intended recipients can read them and leaving no spaces for hackers to slip their way in and alter your messages. Additionally, S/MIME  lets you digitally sign your email  with a Digital Certificate unique to every person. This ties your virtual identity to your email and gives your recipients the assurance that the email they received actually came from you (as opposed to a hacker who access your mail server). You can see how this could have been helpful in the Europol example discussed earlier. While the hackers had access to the companies’ mail servers, in order to d...

Man in the Middle (MITM) Attack

Image
Man in the Middle (MITM) Attack Man-in-the-Middle Tutorial: Learn About Man-in-the-Middle Attacks, Vulnerabilities and How to Prevent MITM Attacks What Is a Man-in-the-Middle Attack? A man-in-the-middle attack  is a type of cyber attack where a malicious actor inserts him/herself into a conversation between two parties, impersonates both parties and gains access to information that the two parties were trying to send to each other. A man-in-the-middle attack allows a malicious actor to intercept, send and receive data meant for someone else, or not meant to be sent at all, without either outside party knowing until it is too late. Man-in-the-middle attacks can be abbreviated in many ways, including MITM, MitM, MiM or MIM. Key Concepts of a Man-in-the-Middle Attack Man-in-the-middle is a type of eavesdropping attack that occurs when a malicious actor inserts himself as a relay/proxy into a communication session between people or systems. A MITM attack exploits the real...