Write an academic report on a significant software security exploit you have studied. Your report should include details such as, for example:
- The nature of the software vulnerability which led to the exploit
- How the exploit was mounted and disseminated by the attacker(s)
- Who were the victims and what motivated the attack
- How it was discovered
- How it was fixed
- What was learned as a result of studying this kind of attack
- What could have been done differently which could have avoided the vulnerability in the first place
- What users could and should be doing to protect themselves
- Your thoughts on whether something like this could happen again somewhere else