Attackers can force Amazon Echos to hack themselves with self-issued commands

Attackers can force Amazon Echos to hack themselves with self-issued commands
Popular “smart” device follows commands issued by its own speaker. What could go wrong?

Attackers can force Amazon Echos to hack themselves with self-issued commands
Popular “smart” device follows commands issued by its own speaker. What could go wrong?