What the Hack
![Camera focusing on keyboard](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2020%2F02%2FKeylogging.png&w=3840&q=75)
What Is Keylogging?
Imagine your keyboard gossiping behind your back, spilling your deepest, darkest, and most embarrassing secrets to the world.
![Phishing attempt with fishing lure](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2020%2F03%2Fphishing_new.png&w=3840&q=75)
What the Hack Is Phishing?
A lump grew in my throat. I’d been conned. More specifically, I’d been phished. And it had nothing to do with the band.
![Juice jacking USB devices](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2020%2F02%2Fjuicejacking.png&w=3840&q=75)
What the Hack Is Juice Jacking?
What might be the only thing more frustrating than getting juice jacked? Being the first documented case of it.
![Internet user disguised while using VPN](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2020%2F02%2FWhatTheHack_VPN.jpg&w=3840&q=75)
What the Hack Is a VPN?
What a VPN does is make you anonymous, mysterious, private—masking your location and your data and your browsing activity.
![Laptop experiencing a brute force attack](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2020%2F02%2Fbruteforceattack.png&w=3840&q=75)
What the Hack Is a Brute Force Attack?
Brute-force attacks are like when you spend five minutes jamming the wrong key into your front door, hoping it might finally work.
![""](/_next/image?url=https%3A%2F%2Fripleyprd.wpengine.com%2Fwp-content%2Fuploads%2F2020%2F02%2Fdeadmanswitch.png&w=3840&q=75)
What the Hack Is a Dead Man’s Switch?
If you want to remember the concept behind dead man’s switch, just think of legendary character actor Joe Morton.