Cyber Terrorism – MITM

October 12, 2025

Cyber Terrorism

MITM

Padmini Arhant

MITMMan-in-the-Middle attack is a serious threat against data security and invasion of privacy.

The less to hardly known cybercrime is surreptitious, sneaky and pervasive. MITM is carried out in disguise unknown to and unaware by victims of such attacks and deployment in cyberspace.

From desperate predators seeking personal to sensitive data, and those deployed by abusive forces in obsession of destructive agenda are primary intruders endangering cyber security and individual rights. 

Notwithstanding, the prevalent commercial trend on data mining selling customers and users private data for revenue among tech giants and others in the economic sector provide fodder for MITM’s carefree indulgence. 

MITM – Man-in-the-Middle attacker engage in diverse formats exploiting opportunity and vulnerability wherever and however possible.

The MITM intervention range from Mobile apps to websites, unprotected networks and servers near and far, not barring devices with data transmission flowing across via WiFi and / or other connections allowing MITM interception.

The MITM prevention and containment is a requirement to prohibit cyber crime.

The data breach reported by major corporations, the credit bureaus and government apparatus alike, the violations compromising personal information and critical data of millions of users is by far the existential danger in cyber terrorism.

The MITM – Man-in-the-Middle attacks crawling into devices, networks and myriad sources do not spare telephone conversations, online and offline chats, emails, including bank accounts, credit cards,  personal IDs, health records and,

Last but not the least the Air tags on luggages are tagged effortlessly proliferating in cyber criminality.

Accordingly, the MITM suspension leading to elimination calls for collective responsibility beginning with manufacturers of all things related to technology and cyber products, mobile apps developers, software companies  and combined security across the spectrum in private and public sector to implement solid measures that guarantee secure communication with end to end encryption at all times especially during exchange of vital and personal information disabling any security lapse.

Cyber crime is the most challenging and contentious security problem confronting users and consumers in the information era.

The data privacy and security requires stealth robust protection with impenetrable systems and interface alongside security features in mobile apps and software designed against any form of data leaks and loophole. 

Padmini Arhant

PadminiArhant.com