Developed by Tom Power, a security analyst at The University of British Columbia, it uses orchestration ... "To exploit this ...