What the Hack

What the Hack Is Phishing?
A lump grew in my throat. I’d been conned. More specifically, I’d been phished. And it had nothing to do with the band.

What the Hack Is Juice Jacking?
What might be the only thing more frustrating than getting juice jacked? Being the first documented case of it.

What the Hack Is a VPN?
What a VPN does is make you anonymous, mysterious, private—masking your location and your data and your browsing activity.

What the Hack Is a Brute Force Attack?
Brute-force attacks are like when you spend five minutes jamming the wrong key into your front door, hoping it might finally work.

What the Hack Is a Dead Man’s Switch?
If you want to remember the concept behind dead man’s switch, just think of legendary character actor Joe Morton.