A lot of hacking now uses automated scripts to search for vulnerabilities. Vulnerable computers might be looted of valuable data (credit card numbers, etc.), or used to send spam email or host "phishing" sites, or to perpetrate denial-of-service attacks, etc. There's a lot of money at stake...