Man-in-the-Middle Attacks: Helping to Eliminate the Threat Without Impacting the Business
Man-in-the-Middle Attacks: Helping to Eliminate the Threat Without Impacting the Business A sophisticated type of phishing, man-in-the-middle attacks occur when an attacker attempts to intercept communications between two parties, such as a customer and a financial organization, without their knowledge. By doing so, the attacker becomes "the man in the middle." Both parties are unaware of the attacker's presence. So, acting as a proxy, the attacker can both review and manipulate the contents of the messages he is relaying between the two parties.

This White paper discusses:

  • What exactly is the man-in-the-middle threat

  • How a versatile authentication platform, as part of a defense-in-depth strategy, can be used to combat the man-in-the-middle threat.
Download White Paper



Around the Network