Hot: It's one of the primary methods that malicious hackers use to find new application and operating system vulnerabilities. It's also a powerful tool that professionals use to analyse the security ...