Answer:
Attackers can exploit the lack of encryption in communication by intercepting and listening to unencrypted communication, allowing them to eavesdrop on user activities in web applications.
Attackers can exploit the lack of encryption in communication by intercepting and listening to unencrypted communication, allowing them to eavesdrop on user activities in web applications.
You may be interested in:
Web Security MCQs