What is a Man-in-the-middle (MITM) Attack

Man-in-the-middle (MITM) types of cyber attacks refer to breaches in cybersecurity that make it possible for an attacker to eavesdrop on the data sent back and forth between two people, networks, or computers.

It is called a man In the middle attack because the attacker positions themselves in the middle or between the two parties trying to communicate. In effect, the attacker is spying on the interaction between the two parties.

What is a Man-in-the-middle (MITM) Attack  

In a MITM attack, the two parties involved feel like they are communicating as they normally do. What they do not know is that the person actually sending the message illicitly modifies or accesses the message before it reaches its destination.

Some ways to protect yourself and your organization from MITM attacks is by using strong encryption on access points or to use a virtual private network (VPN).