A guide to watering hole attacks: Recognizing the danger and bolstering your digital armor