Three Common Cybercrime Vulnerabilities