The Broken Web: Identifying Weaknesses and Strengthening Internet Security