Skip navigation

Man-in-the-Middle (MiTM)

An attack in which a hacker intercepts the communication between two sources, like a client and a server, and impersonates both parties to gain access to sensitive information. For example, a malicious router in a public location offering free wi-fi, or a fake website masquerading as legitimate in order to capture a user’s login credentials.


Want More Content Like This?

Subscribe to get a monthly email featuring blog posts, research, infographics, videos, e-books, security industry news, all handcrafted by Duo. You may unsubscribe any time.