I work in the aviation industry and am involved in cyber security training and also auditing cyber security threats to aviation infrastructures..
There are two issues facing end users...straight forward attempt to breach security by a single attempt like phishing,spoofing, man in the middle attacks, malware, security holes in applications/networks/operating systems ....and someone who does something joined up, like wanting to steal your car, drain your bank account, extort money...
The former’s probability of ‘getting you’ increases pretty exponentially with the number of devices that you have that are internet enabled..people are v careless, default passwords, unimaginative passwords, repeat passwords, lack of two factor authentication, swapping files/downloading from various sites etc etc..I can logon onto most peoples webcams / wi fi routers without a great effort if I’m motivated...
The more subversive , little appreciated is that tools that are not even on the dark web, let alone those there allow a motivated attacker to build up a detailed profile of you, they know about all your family and friends, your hobbies, where you work, when where you travel, what internet devices you interface with..
Again one thing I do professionally is what’s called open source analysis...without accessing information that is ‘protected’ we build up a detailed picture of a person / company to the point that we know more about them then we would tell even a close friend...
We can predict with a high degree of probability their likely future actions...
The mere fact people use forums like this, Facebook, Twitter, Linked In allow people to work these things out...I have a friend who ‘went to ground’ a few years ago..however their digital footprint lasts forever..there are archive databases that hold billions of items that people think were long deleted..
I don’t spend any real money on these activities and they are fully compliant with all data laws...if you were willing to spend a bit of cash, a few dollars and did not car there is an open door waiting for you..
I lost the password to an encrypted disc, it was years since I accessed it...buying an off the shelf password hacker for 15usd had the password broken in 15 minutes and it wasn’t a short ,obvious one either...
The final point is that many hacks are achieved and then like the enigma cracking they run silently in the background waiting for something really juicy to be caught !
And the final final point...most of the guys we seeing getting trapped are the ones who should know better..systems administrators etc...