Skip navigation

Man-in-the-Middle (MiTM)

An attack in which a hacker intercepts the communication between two sources, like a client and a server, and impersonates both parties to gain access to sensitive information. For example, a malicious router in a public location offering free wi-fi, or a fake website masquerading as legitimate in order to capture a user’s login credentials.

Want More Content Like This?

Subscribe to get a monthly email featuring blog posts, research, infographics, videos, e-books, security industry news, all handcrafted by Duo. You may unsubscribe any time.

By providing your contact details, you are confirming that we may contact you and that you have read and understand our General Privacy Notice.