man in the middle attack

What is a Man-in-the-Middle-Attack (MITM) and How to Protect Yourself?

What is a Man-in-the-middle-attack and what are the tools available to protect yourself? Picture a situation where a banker is having a conversation, verifying username and password for his client. Seems legit, right? Except, both of them are unaware that someone else is eavesdropping their secure conversation without their consent. This is called a man…