How specialized search tools expose the internet's hidden vulnerabilities and what you can do to protect yourself