O'Reilly logo

Android Security Cookbook by Scott Alexander-Bown, Keith Makan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Man-in-the-middle attacks on applications

Mobile phone users often use public Wi-Fi networks to access the Internet in coffee shops, libraries, and anywhere they are available. Unfortunately, due to how certain applications are developed, they can still fall victim to man-in-the-middle (MITM) attacks. For those of you who don't know about MITM attacks, they are essentially attacks that allow adversaries to intercept your communication with the devices on your network; if you'd like to know more about the danger and technical specifics of these attacks in nonmobile contexts, check out some of the links in the See also section.

Why should we care about MITM attacks on mobile phones? Well, depending on how badly the content from an "insecure" channel ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required