One of the main advantages that attackers have over users, is the knowledge about how technologies work at its core. Understanding how these things work enable them to change some pieces so they can work to their favor.
Users can take advantage on this approach as well by learning how these technologies work and identifying the possible flaws that can be abused. Knowing this, users can focus their attention on protecting these potential attack vectors and increase their awareness at the same time.