In the cat and mouse game of protecting cloud services, attackers find a sneaky advantage.
http://www.wired.com/