How this deviously effective cybercrime works and how to prevent becoming a victim. Plus, what to do if you realize you’ve been taken.