| ||
This can occur anytime an application performs authentication over the network where the connection establishment requires some sort of cryptography to provide authentication. The fundamental problem is failing to realize that the connection is insufficiently authenticated (and sometimes not authenticated at all).