1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

IDG Contributor Network: Man in the middle attacks on mobile apps

Discussion in 'CSO' started by RSS, Oct 3, 2016.

  1. RSS

    RSS New Member Member

    Man in the middle attacks (MiTM) are a popular method for hackers to get between a sender and a receiver. MiTM attacks, which are a form of session hijacking are not new. However, what might not be known is that mobile devices are vulnerable to MiTM attacks too. In particular, mobile apps are vulnerable to MiTM attacks.

    As part of a series on mobile security I’ve written about other mobile-based attacks here:

    Man in the middle attacks


    OWASP has one of the simplest and best definitions of a MiTM attack. “The man-in-the middle attack intercepts a communication between two systems.” You might also hear this referenced as a malicious proxy. Edward J. Zaborowski gave a presentation on this topic at DEF CON titled: Malicious Proxies.

    To read this article in full or to leave a comment, please click here

    Continue reading...
     

Share This Page