There is no proof of any interruptions that utilized these weaknesses Scientists at an online protection firm say they have recognized weaknesses in programming broadly utilized by a great many associated gadgets — blemishes that could be misused by programmers to infiltrate…