1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Meet the man-in-the-middle of your next security crisis

Discussion in 'CSO' started by RSS, Oct 28, 2015.

  1. RSS

    RSS New Member Member

    Man-in-the-middle attacks are pesky and stealthy maneuvers that show up everywhere from the cloud to SSL. They appear as attackers find ways to secretly insert themselves between any two points of communication in any new or existing technologies.

    “Any communications path can have its own form and methods to exploit MITM attacks,” says Michael H. Davis, CISO, American Bureau of Shipping.

    You could be at a disadvantage if you don’t know where he’ll strike next. CSO presents an array of MITM attacks, detailing methods to secure the enterprise against them. For this medley of MITM threats, CSO takes a look at fake Wi-Fi access points, Session Hijacking, DNS Spoofing, SSL Hijacking, ARP Cache Poisoning, and Man-in-the-Cloud attacks.

    To read this article in full or to leave a comment, please click here

    Continue reading...
     

Share This Page