We started this series with an introduction to how criminals have adapted their cyberattacks around the abundance of personal information available...