This document discusses security and hacking. It defines hacking as attempting to gain unauthorized access to computer resources and lists reasons people hack including for fun, to show off, secretly hack other systems, steal important information, and destroy enemy computer networks during war. It describes different types of hacking like website, network, email, and password hacking. It also outlines the evolution of malware from the 1980s to present day and shows statistics on mobile malware and app vulnerabilities. Finally, it discusses the anatomy of multi-staged cyber attacks and how traditional defenses are failing against new attacks.