Hackers are always looking for new avenues to steal vital personal information, and any sufficiently-advanced computer system can serve as one of those avenues for malicious purposes. One prime ...