If compromised, the consequences go far beyond a typical data breach." The research team identified new and emerging methods that hackers and those with malicious intent could use to exploit or attack ...