There have been real attacks; this is not theoretical. All you have to do is go to an evil Web site or click on a link in an e-mail and some hacker dude owns your computer.