Cyber Threats:How to Spot and Stop Them