{"version":"1.0","provider_name":"Firewalls.com","provider_url":"https:\/\/www.firewalls.com\/blog","author_name":"Rafi Chowdhury","author_url":"https:\/\/www.firewalls.com\/blog\/author\/crashdi\/","title":"Man-In-The-Middle Attack - Firewalls.com","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"0cKsc2OZlz\"><a href=\"https:\/\/www.firewalls.com\/blog\/security-terms\/man-middle-attack\/\">Man-In-The-Middle Attack<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.firewalls.com\/blog\/security-terms\/man-middle-attack\/embed\/#?secret=0cKsc2OZlz\" width=\"600\" height=\"338\" title=\"&#8220;Man-In-The-Middle Attack&#8221; &#8212; Firewalls.com\" data-secret=\"0cKsc2OZlz\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.firewalls.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"What is a Man-in-the-Middle Attack? A Man-in-the-Middle Attack involves a hacker intercepting communications between you and an outside entity. This attack can occur via email, social media, WiFi eavesdropping, general online activity, or even phone communications. In such an attack, the hacker can impersonate one of the entities communicating, for instance pretending to be an [&hellip;]"}