While the use of hacked or malware-infected IoT devices and networks was mostly limited to using the acquired devices as cyberweapons in order to execute massive DDoS (Distributed Denial of Service) attacks in the past, other threats to IoT devices […]