3 Ways to Protect Against Man-In-The-Middle Attacks

2 min read

A man-in-the-middle attack is one where both the client and the server are victims. The attacker sits virtually between both parties and intercepts communications between the two. Therefore, all information passed from one end to the other is accessible to and at the mercy of the attacker. For instance, the attacker could decide to send back a fake reply, deliver a modified message, or manipulate the information for other purposes. How then do you defend against attacks when you’re not even sure whether or not you’re a victim? In this case, the best defense should be a robust offense. You…...

This article is free to read

Login to read the full article


OR
John DeCleene Whilst having spent a lot of his life in Asia, John DeCleene has lived and studied all over the world - including spells in Hong Kong, Mexico, The U.S. and China. He graduated with a BA in Political Science from Tulane University in 2016. Fluent in English and proficient in Mandarin and Spanish, he can communicate and connect with most of the world’s population too, and this certainly helped John as he gained work experience interning for the U.S.-Taiwan Business counsel in Washington D.C. as an investment analyst and then working alongside U.S. Senator Robert P. Casey of Pennsylvania as a legislative intern. He subsequently worked as a business analyst for a mutual fund in Singapore, where his passion for travel and aptitude for creating connections between opportunities and ideas was the perfect intersection of natural ability and experience, spending his time travelling between Cambodia, Hong Kong, and China investigating and discovering untapped investment opportunities. John is a fund manager for OCIM’s fintech fund, and currently progressing towards becoming a CFA charter holder. He loves to travel for business and pleasure, having visited 38 countries (including North Korea); he represents the new breed of global citizen for the 21st century.