View Single Post
Old 09-21-2018, 04:31 AM   #7
murraypaul
Interested Bystander
murraypaul ought to be getting tired of karma fortunes by now.murraypaul ought to be getting tired of karma fortunes by now.murraypaul ought to be getting tired of karma fortunes by now.murraypaul ought to be getting tired of karma fortunes by now.murraypaul ought to be getting tired of karma fortunes by now.murraypaul ought to be getting tired of karma fortunes by now.murraypaul ought to be getting tired of karma fortunes by now.murraypaul ought to be getting tired of karma fortunes by now.murraypaul ought to be getting tired of karma fortunes by now.murraypaul ought to be getting tired of karma fortunes by now.murraypaul ought to be getting tired of karma fortunes by now.
 
Posts: 3,726
Karma: 19728152
Join Date: Jun 2008
Device: Note 4, Kobo One
Quote:
Originally Posted by stumped View Post
...& Why should a hacker be wanting to get into an alexa device. There's nothing IN there. just a speaker in an empty box that can talk to amazon servers...
... and get access to all of the other devices on your network, unless you have segregated them. They would be targeted as a way to get at other devices. They are good targets because they are easy to get hold of and test to find exploits, and there are so many of them deployed.

Last edited by murraypaul; 09-21-2018 at 04:35 AM.
murraypaul is offline   Reply With Quote