small-logo
ProfessionalsCapabilitiesInsights & NewsCareersLocations
About UsAlumniOpportunity & InclusionPro BonoCorporate Social Responsibility
Stay Connected:
facebookinstagramlinkedintwitteryoutube
  1. Insights & News

Article

How to Spot and Avoid Man-in-the-Email Hacking

  • PDFPDF
    • Email
    • LinkedIn
    • Facebook
    • Twitter
    Share this page
  • PDFPDF
    • Email
    • LinkedIn
    • Facebook
    • Twitter
    Share this page

Article

How to Spot and Avoid Man-in-the-Email Hacking

  • PDFPDF
    • Email
    • LinkedIn
    • Facebook
    • Twitter
    Share this page

1 Min Read

Related Locations

Houston

Related Topics

Hacking
Email Privacy
Privacy and Data Security
Data Breach

Related Capabilities

Privacy & Data Security

Related Regions

North America

June 1, 2016

Reprinted with permission from Texas Lawyer. Any opinions in this article are not those of Winston & Strawn or its clients. The opinions in this article are the author’s opinions only.

Everyone who uses email should be aware of the man-in-the-email scam. In this scheme, a hacker compromises a user's email and gains access to the email traffic. The attacker can view some or all of the email traffic depending on the method of compromise. The hacker then waits for the right opportunity to strike—often by altering a legitimate email chain or impersonating a legitimate email user.

View the article

Logo
facebookinstagramlinkedintwitteryoutube

Copyright © 2025. Winston & Strawn LLP

AlumniCorporate Transparency Act Task ForceDEI Compliance Task ForceEqual Rights AmendmentLaw GlossaryThe Oval UpdateWinston MinutePrivacy PolicyCookie PolicyFraud & Scam AlertsNoticesSubscribeAttorney Advertising