Internet vulnerabilities