Should we be concerned about two more dangerous exploits/security flaws\nuncovered by “Long” and “Zheng” (two Swedish security experts using these\nnames to hide their identity from Microsoft)?:\n\n"The first exploit is a bug inside the keyboard and mouse subsystem which\nenables the targeted system to be hijacked and maliciously delete files,\nfolders, music, torrents and other important sounding stuff without the user’s\nauthorization or control.\n\nDetails of how such an exploit works are sketchy, but leaked documents\nreveal the keyboard and mouse APIs offers unprecedented amount of control\nover an operating system, allowing anyone and everyone to have full access\nto your computer with or without your authorization. This exploit allows\nanyone ranging from younger siblings to gang leaders who could use brute\nforce, such as a punch or tickle, to gain access to your keyboard and mouse\ncursors and perform malicious activities such as browsing The Inquirer or\ndeleting vital fraudulent financial documents.\n\nA second exploit highlights a serious flaw inside the popular\nWindows-platform development tool, Visual Studio. An undocumented feature\ninside this software is said to enable the ability for malicious users to\ncompile and execute unsigned and potentially damaging source code. If users\nsomehow come across malicious source code and decide to copy, paste, compile\nand execute within Visual Studio, the resulting application could change\nwallpapers, block access to YouTube, increase the volume and other serious\nirreversible damages to the computer system."