How does a man-in-the-middle attack work? Former ethical hacker Jason Hart explains
A man-in-the-middle attack is where a hacker inserts him or herself into a conversation between two parties. In the case of a cyber security attack that could affect you, this would be your PC or mobile, and the Wi-Fi network.
The hacker then pretends to each party to be the other and gains the information sent between the two. So, a man-in-the-middle attack allows a hacker to intercept, send and receive data meant for someone else, and sometimes not meant to be sent at all, without either knowing until the damage is done.
It’s very difficult to know if you’ve been the victim of a man-in-the-middle attack and it’s quite complicated, so Jason Hart, a former ethical hacker who now works for Gemalto, has created a video to explain it all.
How does a man in the middle attack work with Jason Hart
If successful, an attack of this type allows the hacker to see everything that is sent – all your browsing information, and all your login account details.
That is why it is so important that you are careful when using Wi-Fi – and avoid unsecure, unencrypted Wi-Fi networks whenever possible. We’ve covered this topic before, so do check it out if you want to learn more.
Cyber security attacks are becoming increasingly common, and to highlight this, we have created a comic book about a social network that suffers a massive attack. Jason Hart advised all the devious ways that hackers attack. Visit the website here to read it for free!
Jason has also created two more videos on cyber security. Be sure to watch them to understand hacking risks: