Submitted by Cyber Security ... on Fri, 17/01/2014 - 13:50

In an Unintended Way or The Morale Attacker

Submitted by Cyber Security ... on Mon, 13/01/2014 - 20:52

Man in the middle attack - not all are created equal!

A man in the middle is a classic attack. If there was a popularity contest for attacks I would bet that MitM (Man-in-the-middle) would score one of the top three! To our readers who don't know how it works then it is basically a setup of two endpoints that communicate with each other (i,e, client server) and someone or something seats somewhere in between and starts eavesdropping and maybe even changing the communications on the go.

Here is a nice illustration: