Apple and Amazon hacks: How to minimize your risk