The bad guys on the Internet are narrowing the time frame they need to unleash computer attacks that take advantage of publicly disclosed security holes, new research shows. More and more of these attacks are coming within 24 hours after a vulnerability is disclosed.