(Source: SecurityInfoWatch) While we are certainly not experiencing the challenges seen on television (how many times have you heard that in security) where bad actors are controlling devices for ransom, there is a reason to be concerned as more and more devices today rely on software that can be potentially exploited by cybercriminals.