. . . "The most common way hackers intercept data is by gaining access to your computer." .