Currently browsing category



Man-in-the-Middle (MitM)

Intercepting and Redirecting Genuine Web Sites Traffic Man-it-the-Middle attack uses proxy servers, DNS poisoning and local Hosts file tampering to intercept and redirect end user traffic to fake sites. Fraudsters use MitM tactics to capture login credentials and other sensitive data and tamper with transactions in real-time. MitM attacks can be …


DMZ (demilitarized zone)

In computer networks, a DMZ (demilitarized zone) is a computer host or small network inserted as a “neutral zone” between a company’s private network and the outside public network. It prevents outside users from getting direct access to a server that has company data. (The term comes from the geographic …