Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - This is the first download of the rest of your geeky lives.

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews

spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. Smart Defrag
4. Sergei Strelec's WinPE
5. MusicBee
6. Microsoft Visual C++ 2015-2022 Redistributable Package
7. K-Lite Mega Codec Pack
8. Visual C++ Redistributable Runtimes AIO Repack
9. ImgBurn
10. Sergei Strelec's WinPE 64-Bit for Windows 10 and 11
More >>

top reads

Star 4 Ways To Check System Uptime in Windows 11

Star 6 Ways To Clear Clipboard History

Star How To Enable and Install the Built-In System Monitor (Sysmon)

Star Network Location - What Is It and How To Add It?

Star 4 Ways To Run a Manual Scan With Microsoft Defender

Star How To Easily Backup and Import Windows Defender Firewall Rules

Star How To Install and Restore WMIC in Windows 11

Star How To Bring Back the Classic File Explorer with Ribbon in Windows 11

Star How To Limit Max CPU Usage for Microsoft Defender Scans in Windows 11

Star Recently Opened Files - How To Hide or Show Them In Jump Lists, File Explorer, and Start Menu


MajorGeeks.Com » News » April 2015 » Beware of Man-in-the-middle attacks

Beware of Man-in-the-middle attacks


Posted by: Timothy Weaver on 04/02/15 05:02 am [ comments Comments ]


What is a man-in-the-middle attack?

An attack in which an attacker can read, insert and modify messages between two users or systems. Data is sent from point A (computer) to point B (server/website), and an attacker can get in-between these transmissions.


The object of the attack is to get the victim to disclose personal data, such as log in passwords and financial info.

With a traditional MITM attack, the attacker needs to have access to an unsecured, or poorly secured Wi-Fi router. This is most likely to occur at a public Wi-Fi center.

How can you avoid these types of attack? Follow some of the following suggestions:

• Make sure “HTTPS” is always in the URL bar of the websites you visit.
• Be wary of potential phishing emails from attackers asking you to update your password or any other log in credentials. Instead of clicking in the link provided in the email, manually type the website in questions address into the URL bar of your browser and proceed from there.
• Never connect to public Wi-Fi routers directly if possible. You can use a Virtual Private Network (VPN), or you can use a browser plug-in such as HTTPS Everywhere or ForceTLS.
• Since MITB attacks primarily use malware for execution, you should have a comprehensive Internet security solution such as Norton Security installed on your computer, and be sure to keep the program up to date.
• Be sure that your home network is secured. Change all of the default usernames and passwords on your home router and any other equipment.

Source: Norton


Beware of Man-in-the-middle attacks




Comments
comments powered by Disqus

MajorGeeks.Com » News » April 2015 » Beware of Man-in-the-middle attacks

© 2000-2026 MajorGeeks.com
Powered by Contentteller® CMS System