Losing confidence in IT security
One common scheme to intercept data is called man-in-the-middle, where a thief collects information in transit from one entity to another, say between a consumer and his online bank. Criminals can buy an inexpensive toolkit to set up sophisticated man-in-the-middle phishing attacks with little effort. In fact, there is evidence that organized criminals are using the toolkit to siphon money from online transactions. This certainly makes me nervous about paying bills or making a purchase over the Internet, and I'm not alone.
[ Read more ]