Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

Home > SafeNet > Creating a Secure Browser Authentication Solution to Combat Man-in-the Threats

Creating a Secure Browser Authentication Solution to Combat Man-in-the Threats

White Paper Published By: SafeNet
Published:  Sep 08, 2010
Type:  White Paper
Length:  9 pages

As MitM attacks have evolved, attackers have developed new social engineering tactics, using malware to capture and manipulate personal information relayed between two parties. A MitB attack is of this very nature and is designed to intercept data as it passes over a secure communication taking place through the browser between a user and an online application. A Trojan is embedded in a user’s browser application and can be programmed to trigger when a user accesses specific online sites, for example an online banking site. Once activated, a man-in-the-browser Trojan can intercept and manipulate, on-the-fly, any information a user submits online to the banking application. The information being manipulated could be the amount of money being transferred or the accounts between which it is being transferred; all without the knowledge of the end user or banking counterpart, who both see the transaction as mutually approved. This makes this type of attack very pervasive as it proliferates through the Internet, with devastating effects for the end users, as well as the financial institutions.

Find out about the most effective defense against MitB attacks.

Tags : 
safenet financial services, secure browser authentication, man-in-the threats, mitb, man-in-the-middle, mitm, security