It’s not the game many of us played as kids, but it is a distorted take on the same idea. Man-in-the-middle (MitM) cyberattacks do put someone in the middle of two sides, but that someone is a cybercriminal. And those on either side are clueless victims. In reality, MitM attacks are anything but a game. A typical MitM attack can disrupt operations, intercept usernames and passwords, emails, banking, and other financial details. Read on about how MitM attacks play out, including ways to avoid being caught up in these crimes. READ FULL STORY