UK Online Safety Act leads to rise in searches for fake ID and dark web access


We know that the UK’s Online Safety Act has had a number of consequences including a surge in interest in the use of VPNs. But VPNs aren’t the only things that have seen greater interest.
New research from Comparitech shows more people are searching for fake IDs, how to access the dark web, and torrenting services. The company has recorded a 56 percent increase in impressions for blog posts related to the law and guides to using VPNs as a means of accessing restricted content.
New enterprise browser aimed at securing BYOD and third-party devices


Check Point is launching a new Enterprise Browser, extending zero trust security to unmanaged devices like BYOD, contractors, and third-party partners.
The new feature, available to Check Point Harmony SASE customers from today, delivers full visibility, granular policy enforcement, and compliance-ready data protection without persistent agents or endpoint ownership.
Tycoon phishing kit uses sneaky new techniques to hide malicious links


Phishing emails often feature malicious links (URLs) that lead victims to fake websites
where they are infected with harmful software or tricked into giving away personal
information.
There’s a constant battle between security tools getting better at identifying bad links and attackers trying to hide them more effectively. Barracuda has uncovered some of the latest approaches its researchers are seeing in attacks involving the advanced phishing-as-a-service (PhaaS) kit, Tycoon.
Demand for .AI domain names soars along with values


For the second consecutive quarter sales of .AI domain names have surged -- with a quarterly record of $4.5 million in volume in the last quarter (up from $3.48 million in the first quarter of this year) as demand for artificial intelligence-related branding accelerates.
The latest Domain Investment Index from online payments service Escrow.com reflects the embrace of AI. “Two huge tech trends are colliding here: the incredible uptake of AI in business and the realization that domains are the commercial real estate of the Internet,” says Escrow.com chief executive Matt Barrie.
Browser security tools struggle to detect malicious extensions


Despite the expanding use of browser extensions, the majority of enterprises and individuals still rely on labels such as ‘Verified’ and ‘Chrome Featured’ provided by extension stores as a security indicator.
However, new research from SquareX points up architectural flaws in how browser security tools work which mean they’re unable to detect or prevent the latest advancements in malicious browser extension attacks.
Consumers are putting more trust in AI searches


A new survey of over 2,000 consumers across the US, UK, France and Germany looks at how people are adopting, and trusting, AI tools to discover, evaluate, and choose brands.
The study from Yext finds that 62 percent of consumers now trust AI to guide their brand decisions, putting it on par with traditional search methods used during key decision moments. However, 57 percent still prefer traditional search engines when researching personal, medical or financial topics.
Cloaking-as-a-service set to reshape the phishing landscape


Imagine if hackers could give their scam websites a cloak of invisibility, showing one web page to regular people and a harmless page to security scans. Sneaky, huh?
According to new research from SlashNext that’s essentially what’s happening as cybercriminals start to leverage AI-powered cloaking services to shield phishing pages, fake stores, and malware sites from prying eyes.
Internet-exposed assets reveal industry vulnerability profiles


New analysis from CyCognito of over two million internet-exposed assets, across on-prem, cloud, APIs, and web apps, identifies exploitable assets across several key industries, using techniques that simulate real-world attacker behavior.
Techniques used include black-box pentesting using 90,000+ exploit modules, credential stuffing simulations, data exposure detection, etc. The study also used Dynamic Application Security Testing (DAST) to identify runtime web application vulnerabilities, as well as active vulnerability scanning of internet-facing services to detect CVEs, misconfigurations, and exposed assets.
Let's Encrypt makes free security certificates available for IP addresses


We’re all familiar with the idea of TLS/SSL security certificates that verify the identity of a website and ensure trust and security on the web by confirming that the site you’re visiting is what it says it is.
Usually these relate to the domain name of the site, since that’s how most people gain access, indeed if you type in the underlying IP address instead you’ll often get an error because of the lack of a certificate.
Why data privacy is a fundamental human right


In an age where every click, swipe, and search can be tracked, stored and analyzed, data privacy is no longer a luxury but a necessity. From social media profiles to medical records and financial transactions, personal information is constantly collected and processed, often without understanding or consent.
Recognizing data privacy as a fundamental human right isn't just a legal or technical issue, but vital for individual dignity, autonomy, and freedom of expression.
How safe are your browser extensions? New free database helps you find out


Not all browser extensions are created equal, and just because one is available in a high-profile store doesn't mean it's safe. Stores may do simple verifications to check for obvious red flags, but it's not part of their workflow to investigate deeper indicators of suspicious or malicious behavior.
ExtensionPedia, a new database developed by LayerX, changes that by providing individuals and businesses with detailed risk analyses on over 200,000 extensions to distinguish between safe, risky and malicious tools.
How social media is changing workplace communication


Time was when office colleagues would exchange information, ideas and gossip around the water cooler or coffee machine.
That's changing because of technology though, new research reveals that platforms like TikTok and Instagram are directly influencing how 83 percent of people communicate professionally, fueling conflict and misunderstanding among an increasingly intergenerational workforce.
Why subsea cables are essential to business resilience [Q&A]


While businesses focus on cloud services and digital transformation, they often don't realize that their operations depend on the massive cable networks laid underwater.
Recent incidents have highlighted how critical these subsea cables are for business continuity, so do businesses need to rethink their approach to infrastructure as a result? We spoke to Sharat Sinha, director and CEO of Airtel Business to find out.
Poor online experience leads to rise in 'digital rage'


A new report from performance analytics company Conviva highlights a rise in 'digital rage' as 91 percent of consumers report encountering frustrating digital service issues in the past year.
Businesses risk backlash, lost revenue, and damaged reputations if they fail to address these problems. Poor digital experiences have immediate and tangible impacts on revenue as 55 percent of consumers abandon their purchase, 50 percent switch to another company, and 39 percent cancel their subscription.
Firefox slaps itself on the back for finally adding tab groups and catching up with other browsers


The browser space, like so many other areas of software design, is one filled with inspiration and plagiarism. When one browser adds a new feature, you know it’s probably not going to be long before its rivals follow suit. Firefox is no different, but it likes to take its sweet time.
Mozilla has just launched a tab grouping option to its web browser, finally catching up with every other major browser in existence. Quite why it took so long to introduce what is such a common feature is not clear, but Mozilla has an awful lot to say about it.
Recent Headlines
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.