An Introduction to Cybersecurity -- How Black Hats Use the Internet -- How Black Hats Use Phishing to Trick You -- How Black Hats Use Malware to Infect Your Computer -- How Black Hats Access Your Accounts -- How Black Hats Tap Your Wires -- How Black Hats Attack the Cloud -- How Black Hats Pirate Your Wireless Internet -- How Black Hats Break Encryption -- How to Stop Black Hats.