I see a lot of people referring to Firewalla hardware as a firewall or security tool, and while that's correct, it also offers so much more. Think of the tech as having your very own personal network administrator, making even complex networking tasks as simple as flicking a virtual switch.
It is no different than finding a dog in your backyard, looking at the collar and deciding whether or not to call the number. The feature at the center of the controversy is fairly mundane on the surface - a dog goes missing; Ring alerts nearby camera owners to ask whether the animal shows up in their footage; users can respond or ignore the request entirely and stay invisible to everyone involved.
As vehicles become platforms for software and subscriptions, their longevity is increasingly tied to the survival of the companies behind their code. When those companies fail, the consequences ripple far beyond a bad app update and into the basic question of whether a car still functions as a car. Over the years, automotive software has expanded from performing rudimentary engine management and onboard diagnostics to powering today's interconnected, software-defined vehicles.
FOSDEM 2026 Amid growing interest in digital sovereignty and getting data out of the corporate cloud and into organizations' ownership, the Matrix open communication protocol is thriving. The project was co-founded by Matthew Hodgson and Amandine le Pape, and The Reg FOSS desk met both at this year's FOSDEM for a chat about what's happening with Matrix. The Register has covered Matrix and its commercial Element side quite a few times over the years,
Data has become the defining currency of global power. The nations and organizations that can manage, protect, and share it responsibly will shape the future of economic resilience and international cooperation. In an era where artificial intelligence and digital interdependence connect every market and mission, the ability to build and maintain trust in data is now a central pillar of both commerce and diplomacy.
Never feel that you are totally safe. In July 2025, one company learned the hard way after an AI coding assistant it dearly trusted from Replit ended up breaching a "code freeze" and implemented a command that ended up deleting its entire product database. This was a huge blow to the staff. It effectively meant that months of extremely hard work, comprising 1,200 executive records and 1,196 company records, ended up going away.
The internet you experience daily-endless scrolling, algorithmic feeds serving content you didn't ask for, AI-generated slop clogging search results-isn't the only internet available. It's just the one that's easiest to stumble into. You're not stuck with the internet that has evolved alongside the rise of hegemonic platforms. We're 20-plus years into the social internet, and the winners of the last round of audience capture have made clear they're shifting to optimize for social broadcasting instead of networking, to maximize market share and market cap.
Originally developed by Nest (before the Google acquisition), Thread has existed since 2011. Devised as a power-efficient mesh networking technology for internet-of-things (IoT) products, Thread gathered pace after the 2014 formation of the Thread Group, which develops the technology and drives its adoption as an industry standard. Founding members like ARM, Samsung, Google, and Qualcomm have been joined by Apple, Amazon, and many other big companies over the years.
Ring has launched a new tool that can tell you if a video clip captured by its camera has been altered or not. The company says that every video downloaded from Ring starting in December 2025 going forward will come with a digital security seal. "Think of it like the tamper-evident seal on a medicine bottle," it explained. Its new tool, called Ring Verify, can tell you if a video has been altered in any way.
We live in a time where privacy is something we actually have to work to enjoy. Achieving a level of privacy we once had takes work, and you need to start thinking beyond a single desktop, laptop, tablet, or phone -- all the way to your LAN. Before I scare you all off, understand that this starts on the desktop and extends to the LAN. By beefing up both your devices and your network, you'll achieve a level of privacy that you wouldn't otherwise have.
According to CISA, Gardyn products were affected by two critical and two high-severity vulnerabilities. One of the critical flaws, tracked as CVE-2025-29631, is a command injection issue that can be exploited to execute arbitrary OS commands on the targeted device. The second critical vulnerability, CVE-2025-1242, is related to the exposure of hardcoded admin credentials that can be used to gain full control of the Gardyn IoT Hub.
All of the appliances and systems are brand-new: the HVAC, the lighting, the entertainment. Touch screens of various shapes and sizes control this, that, and the other. Rows of programmable buttons sit where traditional light switches would normally be. The kitchen even has outlets designed to rise up from the countertop when you need them, and slide away when you don't.
I belong to six professional organizations. Or maybe it's 13, 19, 26, or 47. I can't be sure. The ones where I pay dues or volunteer I know well: ASIS International, the Life Safety Alliance, Chartered Security Professionals, and a couple of others. Then come the niche and industry-specific associations like the International Council of Shopping Centers, public-private partnerships such as OSAC and Infragard, and the countless ASIS Communities.
The Indurex platform ingests and correlates data from multiple sources across the cyber-physical stack, with a strong focus on industrial historians, instrumentation and asset management systems (IAMS), alarm management, and OT network and endpoint data. The platform, which can be integrated with third-party OT security solutions, is designed to unify cyber, process, and safety context into a single operational view, using adaptive risk scoring to highlight issues and prioritize response actions.
Vulnerabilities discovered by researchers in Dormakaba physical access control systems could have allowed hackers to remotely open doors at major organizations. The security holes were discovered by experts at SEC Consult, a cybersecurity consulting firm under Atos-owned Eviden, in Dormakaba's Exos central management software, a hardware access manager, and registration units that enable entry via a keypad, fingerprint reader, or chip card.