Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - May the nForce be with you.

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews




spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Smart Defrag
3. Macrium Reflect FREE Edition
4. Sergei Strelec's WinPE
5. MusicBee
6. Visual C++ Redistributable Runtimes AIO Repack
7. K-Lite Mega Codec Pack
8. ImgBurn
9. Unlocker
10. FlyOobe / Flyby11
More >>

top reads

Star Windows 10 Not Dead Yet - You Can Still Get Updates For Free

Star What is a '400 Bad Request - Request Header or Cookie Too Large' Error and How to Fix It

Star How to Fix Windows Install Error 0xC1900101

Star How to Force Enable Windows 10 Extended Security Updates If The Option Is Not Showing

Star Windows 11 25H2 is Out: What’s New and How to Get It Now.

Star Star Trek Fleet Command Promo Codes: Redeem Codes for Free Shards, Blueprints And Resources

Star Boost Your PC Speed with ReadyBoost: How a Thumb Drive Can Enhance Your System's Performance

Star 5 Hidden Windows Tools You’ve Had All Along But Never Use

Star Use the Windows 10 Media Creation Tool Before Support Ends For Windows 10 in 2025

Star Fedora 42 - It Might Be the Prettiest Linux Yet


MajorGeeks.Com » News » April 2015 » Beware of Man-in-the-middle attacks

Beware of Man-in-the-middle attacks


Posted by: Timothy Weaver on 04/02/2015 09:02 AM [ comments Comments ]


What is a man-in-the-middle attack?

An attack in which an attacker can read, insert and modify messages between two users or systems. Data is sent from point A (computer) to point B (server/website), and an attacker can get in-between these transmissions.


The object of the attack is to get the victim to disclose personal data, such as log in passwords and financial info.

With a traditional MITM attack, the attacker needs to have access to an unsecured, or poorly secured Wi-Fi router. This is most likely to occur at a public Wi-Fi center.

How can you avoid these types of attack? Follow some of the following suggestions:

• Make sure “HTTPS” is always in the URL bar of the websites you visit.
• Be wary of potential phishing emails from attackers asking you to update your password or any other log in credentials. Instead of clicking in the link provided in the email, manually type the website in questions address into the URL bar of your browser and proceed from there.
• Never connect to public Wi-Fi routers directly if possible. You can use a Virtual Private Network (VPN), or you can use a browser plug-in such as HTTPS Everywhere or ForceTLS.
• Since MITB attacks primarily use malware for execution, you should have a comprehensive Internet security solution such as Norton Security installed on your computer, and be sure to keep the program up to date.
• Be sure that your home network is secured. Change all of the default usernames and passwords on your home router and any other equipment.

Source: Norton


« WiFi Security Guard will monitor and shield your wireless network straight from the command line · Beware of Man-in-the-middle attacks · China leads the pack in malware attacks »




Comments
comments powered by Disqus

MajorGeeks.Com » News » April 2015 » Beware of Man-in-the-middle attacks

© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition