Our homes are littered with Internet of Things (IoT) devices, even if we might not be aware that they fall into that category. Left unattended, unpatched or unprotected, they are just waiting to be taken over by malicious actors who can use them in numerous nefarious ways. We can now take a closer look at the most vulnerable devices and at what constitutes a threat in the home or business IoT ecosystem.
