Over the last few years, cybercriminals have taken advantage of software/data vulnerabilities to silently deploy their malicious code. In the old days, spam was the primary mode of delivery for malicious code, but today, web-based infection and browser-based exploits are a clear leader. Take steps now to protect your personal devices from online threats.