Innocent Vulnerabilities vs Malicious Backdoors How to Manage Your Risk