Fake online stores look real, rank high, and trap unsuspecting buyers

Shopping on a fake online store can lead to more than a bad purchase. It could mean losing money, having your identity stolen, or even getting malware on your device. E-shop scams rose by 790% in the first quarter of 2025 compared to the same period in… Continue reading Fake online stores look real, rank high, and trap unsuspecting buyers

IBM Power11 debuts with uptime, security, and energy efficiency upgrades

IBM unveiled Power11 today, a new generation of Power servers built to improve performance across processing, hardware, and virtualization. It’s designed to run reliably both on-site and in IBM’s hybrid cloud. Enterprises in banking, healthcare, retail… Continue reading IBM Power11 debuts with uptime, security, and energy efficiency upgrades

Cyberattacks are changing the game for major sports events

Sports fans and cybercriminals both look forward to major sporting events, but for very different reasons. Fake ticket sites, stolen login details, and DDoS attacks are common ways criminals try to make money or disrupt an event. Why are sports events … Continue reading Cyberattacks are changing the game for major sports events

New technique detects tampering or forgery of a PDF document

Researchers from the University of Pretoria presented a new technique for detecting tampering in PDF documents by analyzing the file’s page objects. The technique employs a prototype that can detect changes to a PDF document, such as changes made to th… Continue reading New technique detects tampering or forgery of a PDF document

Google open-sources privacy tech for age verification

Age verification is becoming more common across websites and online services. But many current methods require users to share personal data, like a full ID or birthdate, which raises privacy and security concerns. In response, Google has open-sourced a… Continue reading Google open-sources privacy tech for age verification

Cyberattacks are draining millions from the hospitality industry

Every day, millions of travelers share sensitive information like passports, credit card numbers, and personal details with hotels, restaurants, and travel services. This puts pressure on the hospitality sector to keep that information safe and private… Continue reading Cyberattacks are draining millions from the hospitality industry

Scammers are trick­ing travelers into booking trips that don’t exist

Not long ago, travelers worried about bad weather. Now, they’re worried the rental they booked doesn’t even exist. With AI-generated photos and fake reviews, scammers are creating fake listings so convincing, people are losing money before they even pa… Continue reading Scammers are trick­ing travelers into booking trips that don’t exist

Cloudflare blocks AI crawlers by default, letting sites choose what gets scraped

Cloudflare is now the first major internet infrastructure company to block AI crawlers by default when they try to access website content without permission or payment. Starting today, website owners can choose whether to allow AI crawlers and set rule… Continue reading Cloudflare blocks AI crawlers by default, letting sites choose what gets scraped