Why attacking and hacking – proof of concept – causes service interruption – utilize compromised systems to attack other targets – steal compute power – build zombie network – ransome – attention seeking – personal reasons How does it happen – Webhack exploiting vulnerable apps or scripts – SQL injection – Overflow boundaries – Brutish…