A laptop and mobile device user visits her favorite coffee shop, connecting to the free Wi-Fi hotspot to access the internet. She uses the unprotected hotspot to pay bills, do her banking, and shop on Amazon. Meanwhile, a quiet young man sits in the corner, sipping his latte, and monitoring her internet connection, stealing valuable personal and business information.