hacking myths