Here’s an unsettling prospect—hackers may be able to take complete control of a large number of sets at once without having physical access to any of them. Recently, an employee of a Swiss security consulting company demonstrated via a proof-of-concept the ability to use a low-cost transmitter to embed malicious […]