Security 101: What Is a Man-in-the-Middle Attack?

Source
Advertisement


Specific numbers are hard to pin down on man-in-the-middle (MitM) attacks, but according to IBM’s X-Force Threat Intelligence Index 2018, more than one-third of exploitation of inadvertent weaknesses involved MitM attacks. Exactly how do these hacks play out? How do criminals get in and steal information – and how are their techniques evolving?

Here’s a closer look at the elements of a MitM attack, how they work, and how organizations can avoid becoming a victim.

Advertisement