It didn't take long for hackers to take advantage of the malware's bolt-on structure and transform it into something dangerous.from Latest topics for ZDNet in Security http://ift.tt/1KIBvSc