Man-In-The-Middle

CYBERSECURITY INFORMATION

How does it happen?

Video Transcript
A man sitting in front of a coffee shop.

What is a man-in-the-middle attack?

A man-in-the-middle attack is when an attacker positions themselves between two communicating parties and intercepts or modifies communications between the two parties.

How does a man-in-the-middle attack happen?

Let’s take Bob for example. Bob emails his banking information to his client for payment.

A hacker intercepts this information and replaces Bob’s banking information with his own and forwards the message to Bob’s client.

A laptop computer with the screen showing an anti virus warning.

Not suspecting anything, the client processes the payment, but the funds are deposited into the attacker’s account.

Here are a few tips on how to help protect yourself from a man-in-the-middle attack.

First, if you’re going to wirelessly connect to the Internet, it’s highly recommended you use WPA2 encryption. This helps to secure your network.

Next, it is highly recommended you use a virtual private network, or VPN. This helps protect your identity online and encrypts your internet traffic.

Lastly, when visiting websites, it’s highly recommended you force the use HTTPS whenever possible.

A computer chip with many wires around it.

Man-in-the-Middle informational video

Scroll to top