Man-in-the-middle attacks

05 December 2019

Who doesn’t like FREE public Wi-Fi?

Coffee pouring into cup


The risk is that not every Wi-Fi network you access is ‘genuine’ and once you’re on their network, they can see absolutely everything you do… including your passwords and account details.

Man-in-the-middle attacks

A man-in-the-middle attack is when a data shared from a computer to a server is intercepted. 

Shared Wi-Fi networks are handy but not always completely secure. Not every Wi-Fi network you access is ‘genuine’, hackers sometimes create fake Wi-Fi networks. Once you are logged on, they can watch your every move. 

How to manage the risk

  • Use your mobile device’s data instead of public Wi-Fi.
  • If you need to log onto public Wi-Fi, then consider purchasing a VPN. 

Top 5 VPNs (according to techradar.com)

  • ExpressVPN
  • NordVPN
  • IPVanish
  • Hotspot Shield
  • Surfshark.
Download the infographic to learn how hackers can intercept connections and how to avoid this.
Embed code
Use this code to embed the infographic on your website.
 
<blockquote class="embedly-card"><h4><a href="https://www.ecclesiastical.com/documents/man-in-the-middle.pdf">null</a></h4><p>null</p></blockquote>
<script async src="//cdn.embedly.com/widgets/platform.js" charset="UTF-8"></script>
Cyber selfie Send icon
For more information about the latest threats, listen to our ‘Covered in 15’ podcast with Tom Tahany from Blackstone Consultancy.
In collaboration with Blackstone Consultancy

About Blackstone Consultancy

BSC is a security and investigative advice consultancy and is one of our preferred suppliers. Find out more.