How To Detect and Prevent ‘Man in the Middle’ Attacks