Divya Sree

28%
Flag icon
This is what’s called a “man-in-the-middle” attack.[696] Once the hacker made Sarah communicate over unencrypted HTTPS, he could sit in the middle of Sarah and Bank of America and “hear” everything they were saying to each other. By getting Sarah’s unencrypted password, the hacker could log into Sarah’s account himself and, say, send funds to his account!
Swipe to Unlock: The Primer on Technology and Business Strategy
Rate this book
Clear rating
Open Preview