Tech »  Remote Vulnerability Attack: Understanding the Threat and How to Defend Against It