. . . "The flaws allowed dishonest types to sneak into computers through online connections and snatch user passwords and other personal information." .