Man-in-the-Middle Attacks: Helping to Eliminate the Threat Without Impacting the Business

Man-in-the-Middle Attacks: Helping to Eliminate the Threat Without Impacting the Business A sophisticated type of phishing, man-in-the-middle attacks occur when an attacker attempts to intercept communications between two parties, such as a customer and a financial organization, without their knowledge. By doing so, the attacker becomes "the man in the middle." Both parties are unaware of the attacker's presence. So, acting as a proxy, the attacker can both review and manipulate the contents of the messages he is relaying between the two parties.

This White paper discusses:

  • What exactly is the man-in-the-middle threat

  • How a versatile authentication platform, as part of a defense-in-depth strategy, can be used to combat the man-in-the-middle threat.



Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.