Tech »  How the vulnerability works and why it matters