a breaches in the news this year begs many questions, one of which is this: how do hackers select their victims?The answer: research.Hackers do their homework; in fact, an actual hack typically takes place only after many hours of first studying the target.Here???s an inside look at a hacker in action:Using search queries through such resources as Google and job sites, the hacker creates an initia