Attacks and vulnerabilities