Trending
  • Getting The Best Kids Tablets in 2016
    Getting The Best Kids Tablets in 2016
  • 8 of the Useful Quick Look Plugins You Should Install on Your Mac
    8 of the Useful Quick Look Plugins You Should Install on Your Mac
  • How To Uninstall The Apps On Mac OS X
    How To Uninstall The Apps On Mac OS X
  • How to View Your Saved Wifi Password in Windows 10
    How to View Your Saved Wifi Password in Windows 10
  • How You Can Keep Your WiFi Safe

    How You Can Keep Your WiFi Safe

    Even if having to deal with WiFi security is a real pain for some, it is something that needs to attention. Someone could steal your WiFi and use it for who knows what and cross your fingers that it is not for anything illegal.

    Read more...

  • What You Should Keep in Mind Before Buying a Used Smartphone

    What You Should Keep in Mind Before Buying a Used Smartphone

    As long as the phone works fine and has what you need, who care if it's not this years model. So, you've decided that the best thing you can do is buy a used phone. Before you go phone shopping, there are some things you need to keep in mind before you buy.

    Read more...

  • The Most Effective Ways to Get More Followers on Instagram

    The Most Effective Ways to Get More Followers on Instagram

    Before you give up and think about closing your Instagram account, there are some tips and tricks on how to increase your Instagram followers you should know about. By following these tips,...

    Read more...

  • How to Make a GIF From a Video (Windows, Mac, iOS, Android)

    How to Make a GIF From a Video (Windows, Mac, iOS, Android)

    ver the certain period of time, GIF images have gained so much popularity, and you can see them on the Social Networking websites. In the comments section of a website or your Twitter timeline, GIF is actually an animated image format which is created from different images or videos.

    Read more...

  • How to Take Great Pictures with Your Android Device

    How to Take Great Pictures with Your Android Device

    When was the last time you used a digital camera to take a picture? It's probably been a while, right? Most of us used our smartphone to take a million pictures of our pets or of that beautiful sunset you were lucky enough to see.

    Read more...

  • The Best iPhone 7 Tips and Tricks You're Probably Not Using

    The Best iPhone 7 Tips and Tricks You're Probably Not Using

    iOS offers an endless amount of great features you can enjoy, but you may not be taking advantage of them because you might not even know they exist or are too afraid you'll mess something up by tampering with it.

    Read more...

  • Everything You Sould Know Before Buying an SD Card

    Everything You Sould Know Before Buying an SD Card

    It's almost hard to believe that something so small can cause so many problems, doubts or confusion. For some, how you choose an SD card is of little or no importance while to others it's the most important thing.

    Read more...

Man In The Middle Attacks - Is Your Browser Safe?

Man In The Middle Attacks - Is Your Browser Safe?

7.0/7 rating 1 vote

Every time we go online, we are exposed to all types of threats that are looking for the smallest weakness in our connection to try and take as much sensitive information as possible. One of those threats is called Man in The Middle. Never heard of it? With so many threats out there, it's very hard to keep track of all of them, but it's one you need to protect yourself from.

Man in the Middle is when someone intercepts a communication between two people and their systems and eavesdrops in their conversation. This person will relay messages between these two people and can capture and change relevant information in real-time. So, you won't actually be getting what the other person is really saying and can easily be tricked into giving sensitive information when the other person never asked you for it.

How can this person gain access? A common way is using a malignant router on one either side of the two systems or Malware, Phishing, DNS Spoofing and that is why one should always have a good antivirus software. This will give the hacker access to the user's web browser and information during the conversation. Let's say you want to check your Email, and you decide to use the public WiFi signal that is exactly what the hacker wants you to do to gain access to your account and your sensitive information.

This hacker can intercept your connection between you and the signal. The hacker will now have access to everything you are doing on your device. If you send and Email to a friend on this public WiFi signal, what the hacker does is that he/she can divert that Email to read it and change anything on it before sending to whomever you were going to send it to. Scary, right? Gives me the willies. That is the main reason why I never use public WiFi, Better safe than sorry.

The attack can only succeed if the hacker can impersonate each victim without the other one noticing anything unusual and most of the time the two victims don't see anything until it's too late. The bad news is that in HTTP it is tough to perceive MitM attacks, but if you are using https, you should get a warning from your browser. That way you know you are at risk, but you may get such a warning if the hacker has already gotten into your system or the system at the other end.

How to Detect Man in The Middle Attacks

A way you can spot a man in the middle attack is y paying attention to a certificate error you might get if you were trying to log on to do online banking. The error message would say that your bank's websites lack the valid encryption certificate. Please don't click on this error message and ignore it, you got it for a reason.

Man Middle Attack Certificate

Another way you can become a victim of a Man in The Middle attack is when you do sensitive online stuff such as login to your bank account. If you see that your bank's page is on HTTP, then I wouldn't log in. Banks usually have HTTPS, so every time you do want to do any transactions that involve sensitive information, look for the S.

How to Protect Yourself Against Man in The Middle Attacks

Remember, if you want to stay safe against Man in the Middle attacks, there are some things you keep in mind. Don't dismiss certificate warning since they show up because something is just not right. The reason why many choose to ignore is that they think that it is because of a misconfigured server. It's better to figure out if that is the case than click through and suffer the consequences.

browser safe

Always have a good antivirus on your computer such as Eset (which is what I use on one of my computer's and have been using it for years. Excellent software and keeps me safe. Ah, one more thing, please try not to login into your sensitive accounts on public WiFi, it's just not a good idea.

Conclusion

Man in the Middle Attacks are usually not within our control, but like you just read, there are things you can do to keep your info safe. How do you practice online safety? Let me know in the comments and don't forget to give the post a share.


Latest

  • How You Can Keep Your WiFi Safe
    How You Can Keep Your WiFi Safe
  • How to Hide Pictures, App Icons and Files on Android
    How to Hide Pictures, App Icons and Files on Android
  • What You Should Keep in Mind Before Buying a Used Smartphone
    What You Should Keep in Mind Before Buying a Used Smartphone
  • 10 Best Backpacks for College Students
    10 Best Backpacks for College Students
  • Top 5+ Best Point and Shoot Digital Camera
    Top 5+ Best Point and Shoot Digital Camera
  • How to Use Face Swap on Snapchat ( Face-Swap Feature )
    How to Use Face Swap on Snapchat ( Face-Swap Feature )

Author

Judy Sanhz
Judy Sanhz

I can never get enough of tech in general, whether it's Android or web apps, but helping others solve their tech problems also brings great satisfaction. I carry a device wherever I go and I'm always connected. Life without Internet just sounds too scary to me. :-).

comment

Leave a comment

You are commenting as guest.

Recent Comment

Great article

I run Directory Report as an administrator
That way it can find hidden file
http://www.file-utilities.com

It can...

Allan Man 23. November, 2016 |

This article is best google chorme are install.This extensions are help different email autuomatically introduce to user. This is must...

Tilly Wilson 10. November, 2016 |

Photobucket has been having technical issues for some time and is, in fact, down right now.

Also, you REALLY need a copy editor. Are...

EvenNote 04. November, 2016 |

About Website

OMG!HOWTO is a technology website where we cover the latest from Apple, Facebook, Microsoft and Tips & Tricks. We seek to present fresh news, useful tips, tutorials, applications that the modern technology user will appreciate. OMGHOWTO.COM is powered by Joomla.

0
Shares
0
Shares