1.4 How to find out about emerging attack techniques and how to  recognise THem