Post navigation Cyber Threats: How modern hackers are waiting to ensnare the user Turning Concern into Action