Implementation Primer – Implementation Guidelines for Creating a Secure Browser

The success of multi-factor authentication implementations in addressing security threats and attacks, such as eavesdropping, password guessing, phishing, social engineering, Man-in-the-Middle (MitM) and the like, is well known. This has also challenged hackers and cybercriminals to continue developing new kinds of attacks in their ongoing quest to steal data and identities, and commit fraud. SafeNet is currently experiencing increasing interest from the market for Man-in-the-Browser (MitB) solutions, not only in the European and American online banking markets, but worldwide.

Today, the most common type of attack is the Man-in-the-Middle (MitM) attack. Basically, a MitM attack takes place when an attacker intercepts communications between two parties, such as a customer and a financial organization, without their knowledge. By doing so, the attacker becomes “the man in the middle.” As a proxy, the MitM can both capture and manipulate the contents of the messages relaying between the two parties without their knowledge.