What is a hacker?
Ted Harrington isn’t the typical hacker you see in movies. He’s the founder and leader of an ethical hacking company hired by organizations to break into their own systems—legally and safely—so vulnerabilities can be fixed before criminals exploit them. He is best known for leading the first successful hack of the iPhone, exposing critical flaws that Apple quickly patched—work that helped move modern security forward. Ted believes most people don’t need deep technical expertise to stay safe—they need better thinking habits to ultimately protect them from becoming a victim to a scam and ultimately identity theft.
That’s because hacking itself isn’t good or bad. It’s neutral. What matters is motivation. White-hat hackers use their skills to protect users and strengthen systems, while black-hat hackers exploit weaknesses for personal gain. At its core, hacking isn’t a crime—it’s a way of thinking, built on questioning assumptions, finding weak points, and understanding how systems really work.
Watch the full Control Room episode on YouTube to learn more.
Believing you are not a target is dangerous
Many people assume they’re too insignificant to be targeted by scammers and identity thieves. That belief is exactly what attackers rely on. Hackers don’t target individuals because they’re special—they target scale. The safer question isn’t why would someone target you, it’s what would happen if they did. The goal isn’t fear—it’s awareness so you can take appropriate steps to help protect yourself.
Why scams work and why security starts with you
Thinking like a hacker doesn’t require technical tools—just smarter habits. Reusing passwords or clicking links directly from emails creates easy openings for attackers, while small changes like using a password manager, going directly to trusted sites, and verifying the person making a request can significantly reduce risk.
The hacker mindset isn’t about fear or distrust. It’s about healthy skepticism: pausing to ask who benefits if you act right away, and what changes if you wait. Hackers don’t just target computers, they rely on assumptions that can be exploited . Being a hacker doesn’t mean you have to hack the hacker. It means being curious, asking questions, and taking a moment before you act or share personal information or access.
Understand the threats shaping today’s scams
Join us every Wednesday at 5 p.m. ET / 2 p.m. PT on the LifeLock YouTube channel for a new episode of Control Room. Each week, we break down emerging scam tactics, explain how fraudsters are operating right now, and share clear, practical steps you can take to protect your identity with confidence.
Editor’s note: Our articles provide educational information. LifeLock offerings may not cover or protect against every type of crime, fraud, or threat we write about.
Start your protection,
enroll in minutes.
LifeLock is part of Gen – a global company with a family of trusted brands.
Copyright © 2026 Gen Digital Inc. All rights reserved. Gen trademarks or registered trademarks are property of Gen Digital Inc. or its affiliates. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.