When you think of computer hacking, it’s tempting to imagine a sophisticated cybercriminal exploiting the latest security holes to break through our devices’ defenses. The reality tends to be more mundane.