Skip to main content

A form of malicious activity where the attacker secretly accesses, relays and possibly alters the communication between two parties who believe they are communicating directly with each other. Formerly known as man-in-the-middle.