We read about hacks and vulnerabilities all of the time. A retailer is successfully attacked via malware and credit cards are stolen. A credit card processing company is hacked via cross site scripting and credit cards are stolen. An online social media company is attacked through an SQL injection attack and usernames and passwords are stolen.