Also known as a Man-In-the-Middle attack, it involves a third party taking control of communications between 2 entities and posing as 1 of the real entities to carry out further activities like eavesdropping, data altering and malware infection. See also: virus, malware, hack

Hijack was last modified: February 1st, 2017 by James Piedra