Hmmmm.... so you're going to have hackers across the Internet finding their way into the control software for devices connected to computers, then manipulate them. Imagine a "remote control mannequin"... hacker takes control of it, reaches up and strangles an unsuspecting user at their computer console. 
