Information security
fromTheregister
52 minutes agoAI vendors' response to security flaws: It wasn't me
AI vendors promote AI for security but often dismiss flaws as intended behavior.
Bayer is supplementing human security patrols around its 8,000 acre Hawaiian corn farm with robotic security dogs, supplied by the tech firm Asylon. The Asylon dogs are meant to guard the company's precious maize from vandals, wildfires, wild fauna, and other hazards around the clock.
Data-driven approaches in livestock health management can significantly enhance decision-making processes, leading to improved animal welfare and productivity in the agriculture sector.
Mirax integrates advanced Remote Access Trojan (RAT) capabilities, allowing threat actors to fully interact with compromised devices in real time, enhancing its operational value significantly.
Smart TVs are capable of tracking user data, including viewing habits and app usage, which can lead to personalized advertising and content recommendations. Users may prefer to limit this tracking to protect their privacy.
In the past, roof inspections mostly focused on what could be seen from the outside. Contractors looked for broken shingles, worn flashing, or areas where water might enter the roof. The problem is that roof damage does not always show clear signs right away. Water can move through roofing layers before it becomes visible inside the home.
Long-range radio waves can pass through obstacles more easily, which makes them perfect for monitoring expansive factories or outdoor infrastructure. A recent report by Fabrity highlighted that these systems use very little power. This allows sensors to operate for 5 to 10 years on a single battery. Using such tech means you do not have to install expensive wiring across your entire site.
All of the appliances and systems are brand-new: the HVAC, the lighting, the entertainment. Touch screens of various shapes and sizes control this, that, and the other. Rows of programmable buttons sit where traditional light switches would normally be. The kitchen even has outlets designed to rise up from the countertop when you need them, and slide away when you don't.
All smart homes are at risk of being hacked, but it's not a likely event. The type of bad actors that target smart homes and devices, such as security cameras, are opportunistic. They search randomly for easy targets -- they don't tend to choose a particular home to attack and then try to circumvent that specific system.
Retail point-of-sale systems today offer a wide range of options for peripherals and hardware. Their technical specifications play a major role in selection, and big retailers often choose multiple vendors to reduce a single point of failure. This gives them an advantage to negotiate price or support as well. Technically, these peripherals also require updating with new models and may have new feature sets. This necessitates the redevelopment of point-of-sale applications, increasing development costs.
According to CISA, Gardyn products were affected by two critical and two high-severity vulnerabilities. One of the critical flaws, tracked as CVE-2025-29631, is a command injection issue that can be exploited to execute arbitrary OS commands on the targeted device. The second critical vulnerability, CVE-2025-1242, is related to the exposure of hardcoded admin credentials that can be used to gain full control of the Gardyn IoT Hub.