Hot Authentication Tools

The trusty telephone is emerging as one of the key elements in new multifactor authentication schemes designed to protect online banking and other web-based financial transactions from rapidly evolving security threats.

Hot Authentication Tools prev next

Loading...

Man-in-the-Middle (MITM) attack

Man-in-the-middle attacks use various social engineering techniques to intercept user credentials and commit fraudulent actions completely under the radar. How MITM attacks work:

1. User clicks on link in a phishing email, goes to MITM site and enters credentials (including token-generated one-time password).

2. MITM site connects with bank site and impersonates legitimate user using phished credentials.

3. Bank site grants MITM account access.

4. MITM displays phony page stating system is unavailable, or waits until user wants to log off, then displays phony page confirming log-off.

Prev Next 4/21

Comments on this image

There are currently no comments for this image.

Post new comment

Users posting comments agree to the Good Gear Guide comments policy.

Login or register to link comments to your user profile, or you may also post a comment without being logged in.

Close

Hot Authentication Tools

21 images
Shopping.com

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?