The scammer creates a story to help gain your trust so they can trick you into sharing personal details, installing malware, or sending money. Man-in-the-middle attacks: A hacker can get between you and an application (or another user), intercepting data. The goal of these attacks is ...