New post Need visibility? Apply for a FREE post for your Startup.  Apply Here

Now you know

How to protect yourself from Man-in-the-Middle cyber attacks

2 Mins read

Man-in-the-middle (MITM) attacks pose a sneaky threat in today’s connected world. This cyber attack works by secretly intercepting communication between two parties. The attacker can then view or even modify exchanged data for malicious purposes without the sender or receiver knowing.

Picture yourself in a restaurant with a side chick, you’re using all the sweet words in your dictionary to convince her to spend the weekend with you because your wife is away to visit her mother on the other side of town. While you’re in the moment, you have no idea your nosey neighbour is across the seats, taking a video and live-streaming it to your wife. Wahala!

The sweet words you’re saying represents the data being sent over a network – from one end (you) to another (side chick). The nosey neighbour is the man-in-the-middle who intercepts data during transfer, and sends it to another destination. That is the basic structure of the MITM attack.

MITM attacks commonly target Wi-Fi connections in public places like restaurants, hotels, public transport, airports, etc. Attackers position themselves between your device and the Wi-Fi router to eavesdrop on data. They may then attempt to harvest passwords, financial information or other sensitive data. Phishing schemes also frequently leverage MITM tactics.

An example of MITM attack is portrayed in the movie – Mission Impossible: Dead Reckoning (Part one) (nice movie, you should see it if you haven’t). In the scene where Benji and Luther were giving Ethan the direction to the bridge where Ilsa and Grace were fighting Gabriel. While Benji was guiding Ethan through the corners, The Entity hijacked the communication, impersonated Benji, and led Ethan to an entirely different location.

That right there, is a Man-in-the-middle attack.

A real life example involved a high-profile communication that was intercepted in 2015. The MITM attack was on a phone call between some world leaders. The attackers spied on confidential diplomatic communication by tapping into network links from telecom providers.

Read also: What is the difference between the Internet, Extranet, and Intranet?

Steps to take to protect yourself from MITM attack

So how can everyday internet users avoid getting caught by MITM attacks? Here are important safeguards:

  • Never use public Wi-Fi for financial transactions or accessing sensitive accounts. Assume public connections are compromised. Stick to cellular data when possible.
  • VPN protection encrypts all network traffic which blocks MITM surveillance and tampering. There are reliable VPN service providers that are inexpensive and provide comprehensive security.
  • Look for the lock icon and “https” in your browser URL bar. This verifies website encryption to prevent data interception. Avoid “http” sites.
  • Be suspicious of unexpected security warnings about invalid certificates from trusted sites as it may indicate an attacker intercepting the connection.
  • Disable auto-connecting to public Wi-Fi. Manually connecting only when necessary reduces your vulnerability window.
  • Regularly update your operating system, browsers and security software to block the latest MITM attack methods. Set automatic updates where possible.
  • Verify the site SSL certificate matches the domain you entered. Mismatches could mean an attacker created a fake connection pretense.
  • Avoid online banking or shopping on devices using outdated or non-secure protocols like SSL and TLS 1.0 as they are prone to MITM.

With cyber criminals constantly honing new tactics, we all must remain vigilant to keep our data secure. But following best practices for safe connections, encryption and keeping software up-to-date will go a long way in blocking man-in-the-middle attacks.

Protect yourself by staying alert and being proactive.

Don’t miss any tech news ever!

We don’t spam! Read our privacy policy for more info.

882 posts

About author
When I'm not reading about tech, I'm writing about it, or thinking about the next weird food combinations to try. I do all these with my headphones plugged in, and a sticky note on my computer with the words: "The galaxy needs saving, Star Lord."
Articles
Related posts
Now you know

What you need to know about the O.MG Cables

2 Mins read
When you’re asked what age we’re in, you’d likely say we are in the digital age – an age where our devices…
Now you know

The man who scammed two tech giants of $122 million

1 Mins read
There have been several stories about people running elaborate schemes to defraud people and large companies. Many of these schemes have gone…
ArticleNow you knowRandom

SSD vs. HDD: What's The Difference?

3 Mins read
As we continue to bask in the euphoria of recent technological trends in this age of digitization, data generation, manipulation, information processing…
Newsletter Subscription

🤞 Don’t miss any update!

We don’t spam! Read more in our privacy policy

Join our Telegram channel here - t.me/TechpadiAfrica

Leave a Reply

×
Article

Top 10 IT skills that will shape 2024, according to Coursera