Tag: Spoofing

Imagine if the next time you sent a birthday card to a friend, somebody else opened it first. In this scenario, the crook was looking for any cash you might have included in the card before forwarding it on to its rightful owner. This is precisely the concept of a Man-in-the-Middle (MiTM) attack. First documented…