The definition of "hack" got redefined years ago. Trying to reclaim it is a lost cause. It is the same for symbols like the pound sign to hash tag.... Or stupid phrases like "interwebs" for the internet.
The terms are going to evolve and not always in a good way.
I don't agree, in fact many professionals today in the actual white/gray/black hat communities would strongly disagree with that statement. Actual terms have concrete definitions, it's why you don't see professionals that actually disassemble and study malware won't make statements conflating malware and viruses. Just because the public incorrectly uses the term "virus" to mean the same thing as "malware", trendy or not, is still wrong by definition.
Actual hacking is nothing more than finding a need improve and/or fix something to perform better and/or become more reliable for yourself
and for others as well. So even a child can notice that their battery operated toys may have problems, but when they take the time to find out what's going on, try a few things to make things better, and share that information to their friends because they have the same toys, that's what hacking was based around. If their efforts gain attention from the toy manufacturers themselves and they implement improvements to prevent those problems, that's the end goal of actual hacking.
For professionals, it's common place to find people who specialize in particular areas of interest, for example 802.x technology. When someone discovers that when x is applied to y and produces an unexpected (negative) result, but continues to try and find a way (if possible) to make or suggest improvements to mitigate (or eliminating) existing problems, that is a hack. OSWP's specialize in wireless security constructs, far more than a typical IT professional would.
If professionals were to adopt your idea of what hacking is, which is incredibly vague, would have little to no actual value. So if you were to tell me that an online newspaper was hacked, it really doesn't reveal much useful information.
An actual person in our field are more interested in what happened by understanding how it was implemented. We use terms like attack vector to describe what sort of method was used. For example using an attack vector based around exploiting Java-based vulnerabilities differ from using attack vectors based around exploiting MS Exchange (email) or SQL-based vulnerabilities.