Technology Review: Exploiting Security Holes Automatically - http://www.technologyreview.com/Infotec...