ManintheMiddle (MITM)

An attacker who is able to intercept data flowing between two parties can “man-in-the-middle” the communication, causing data to flow through their own computer where they can view or manipulate it.