More advanced attackers may use a weakly protected toy as a way of invading a home network. By exploiting toys with poor ...