Quote:
Originally Posted by stumped
...& Why should a hacker be wanting to get into an alexa device. There's nothing IN there. just a speaker in an empty box that can talk to amazon servers...
|
... and get access to all of the other devices on your network, unless you have segregated them. They would be targeted as a way to get at other devices. They are good targets because they are easy to get hold of and test to find exploits, and there are so many of them deployed.