A common misconception about cyber attackers is that they use only highly advanced tools and techniques to hack into peoples’ computers or accounts. In reality, they have learned the easiest way to access our devices, accounts and data is to simply ask for them. This article explains how these attacks work and how to easily spot and stop them.