Growing holes in computer security