So you receive a note from a financial institution asking you to log on to take care of an urgent challenge, click the conveniently supplied hyperlink, enter your credentials in the shape, along with the hackers have you.. Black Hat Hackers can gain unauthorized use of your system and wipe out your vital knowledge. The tactic of attack they use com