MitM

To control the network traffic to read, modify and alter the information, without people noticing. SafeSigner architecture is immune to this type of attack, because it provides a second channel through which the user verifies the actual information transacción. SafeSigner generates a confirmation code that can not be generated by the MitM.

Phishing

Duplication of a web page to simulate the visitor is...

Pharming

This attack exploits vulnerabilities in software Domain Name System servers...

MitB

The main purpose of this type of attack is to...

MitM

To control the network traffic to read, modify and alter...

Skimmer

Use of a device that attaches to clone the ATM...