My interview with IT Pro on how hackers navigate the exploitation phase and embark on betraying our trust.