{"version":"1.0","provider_name":"Firewalls.com","provider_url":"https:\/\/www.firewalls.com\/blog","author_name":"Andrew Harmon","author_url":"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/","title":"What is a Man in the Middle Attack? Keeping Online Footsteps Hidden","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"ZeBMhEuSlq\"><a href=\"https:\/\/www.firewalls.com\/blog\/man-in-the-middle-attack\/\">What is a Man in the Middle Attack? How to Keep Your Online Footsteps Hidden<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.firewalls.com\/blog\/man-in-the-middle-attack\/embed\/#?secret=ZeBMhEuSlq\" width=\"600\" height=\"338\" title=\"&#8220;What is a Man in the Middle Attack? How to Keep Your Online Footsteps Hidden&#8221; &#8212; Firewalls.com\" data-secret=\"ZeBMhEuSlq\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.firewalls.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/10\/shutterstock_510172012-1024x576.jpg","thumbnail_width":1024,"thumbnail_height":576,"description":"A Man in the Middle breach is a cyber-attack in which the bad guys parks themselves between you and the web, spying on your every move until an opportunity to strike presents itself. Learn why MITM is popular, how the attack works, & how to keep your network safe."}