Eventually, the system reacts. The hack can be neutralized if the underlying vulnerability is patched. By this I mean that someone updates the system in order to remove the vulnerability or otherwise render it unusable. No vulnerability, no hack. It’s as simple as that.

