How End-User Devices Get Hacked: 8 Easy Ways