How hackers take advantage of the 'Bridge' problem | Al Mayadeen English