man-in-the-middle love

man-in-the-middle

Definitions

from Wiktionary, Creative Commons Attribution/Share-Alike License

  • n. An adversary that intercepts, and often modifies, communications.

Etymologies

Sorry, no etymologies found.

Examples

  • When users in Iran went to a Google site, including Gmail and Google Docs, they could be intercepted by the impostors in what is known as a man-in-the-middle attack.

    NYT > Home Page

  • Breaking into a secure link is known as a "man-in-the-middle attack."

  • Spoofing those Web sites would allow the Iranian government to use what's known as a man-in-the-middle attack to impersonate the legitimate sites and grab passwords, read e-mail messages and monitor any other activities its citizens performed, even if the connections were protected with SSL Secure Sockets Layer encryption.

    CNET News.com

  • Spoofing those Web sites would allow the Iranian government to use what's known as a man-in-the-middle attack to impersonate the legitimate sites and grab passwords, read e-mail messages, and monitor any other activities its citizens performed, even if Web browsers show that the connections were securely protected with SSL encryption.

    CNET News.com

  • But what if instead of merely eavesdropping, the malicious party actually interferes with the connection, placing itself between the client and the server, intercepting everything sent between the two, known as a man-in-the-middle MITM attack .

    Ars Technica

  • The discovery was made when the developer used a tool called a "man-in-the-middle," which could watch what data was sent to and from an application in real time.

    Washington Post: Breaking News, World, US, DC News & Analysis

  • My answer concerned a man-in-the-middle attack I once did on Craigslist personals.

    Antonio Garcia-Martinez: Pseudorandomness, Or How I Got Into Y Combinator and Had a Child With a Woman I Barely Knew, Almost Simultaneously

  • "Note: although it was possible before, with man-in-the-middle attacks, it required the victim to initiate a financial transfer in the first place," she writes.

    ZeuS botnet has a new use: Stealing bank access codes via SMS

  • Also noteworthy is a new feature called Extended Protection for Authentication, which prevents many sophisticated man-in-the-middle attacks that can strike at some of our most trusted security protocols (such as SSL and TLS).

    The InfoWorld expert guide to Windows 7 security

  • It wouldn't be very difficult for a malicious coder to tweak a "man-in-the-middle" banking program and get it to start inserting extra fields into a legitonline tax form, or to crackinto a legit tax transaction andbegin redirecting cash transfers.

    Tax-related cyberscams on a growth curve

Wordnik is becoming a not-for-profit! Read our announcement here.

Comments

Log in or sign up to get involved in the conversation. It's quick and easy.