How to fix the security vulnerabilities around IoT

Take this scenario: after a long tiresome day, you enter your home exhausted, and fall flat on the couch; and you are in no mood to go on a cumbersome remote-hunting endeavour. In this situation, what do you do? You decide to give out a series of voice commands:...Read more