An ex-hacker has one hour to stop a cyber security threat that is putting lives at risk.An ex-hacker has one hour to stop a cyber security threat that is putting lives at risk.An ex-hacker has one hour to stop a cyber security threat that is putting lives at risk.