IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more
Google unearths Internet Explorer zero day exploited by North Korean hackers
zero-day exploit

Google unearths Internet Explorer zero day exploited by North Korean hackers

The exploit was found after analysing malware embedded in documents targeting users in South Korea
8 Dec 2022
Musk adds beds to Twitter HQ, sparks building code investigation
Business operations

Musk adds beds to Twitter HQ, sparks building code investigation

San Francisco city officials are looking into whether the changes, part of Musk's "hardcore" office plan, constitute code violations
8 Dec 2022
HPE expands partner ecosystem amid GreenLake updates
Cloud

HPE expands partner ecosystem amid GreenLake updates

HPE GreenLake for RedHat OpenShift Container Platform will offer increased flexibility and scalability, HPE says
8 Dec 2022
Tech giants to share $9 billion Pentagon cloud computing contract
Cloud

Tech giants to share $9 billion Pentagon cloud computing contract

The JWCC is the successor to the ill-fated Jedi contract awarded to Microsoft in 2018
8 Dec 2022

Latest News

View All
Apple steps up user security with end-to-end encryption for iCloud
encryption

Apple steps up user security with end-to-end encryption for iCloud

Apple’s new data protection feature comes as users contend with an increasingly sophisticated threat landscape
8 Dec 2022
Tech giants to share $9 billion Pentagon cloud computing contract
Cloud

Tech giants to share $9 billion Pentagon cloud computing contract

The JWCC is the successor to the ill-fated Jedi contract awarded to Microsoft in 2018
8 Dec 2022
Musk adds beds to Twitter HQ, sparks building code investigation
Business operations

Musk adds beds to Twitter HQ, sparks building code investigation

San Francisco city officials are looking into whether the changes, part of Musk's "hardcore" office plan, constitute code violations
8 Dec 2022
Google unearths Internet Explorer zero day exploited by North Korean hackers
zero-day exploit

Google unearths Internet Explorer zero day exploited by North Korean hackers

The exploit was found after analysing malware embedded in documents targeting users in South Korea
8 Dec 2022

Most Popular

Empowering employees to truly work anywhere
1.Sponsored

Empowering employees to truly work anywhere

22 Nov 2022
Defra's legacy software problem 'threatens' UK gov cyber security until 2030
2.Business strategy

Defra's legacy software problem 'threatens' UK gov cyber security until 2030

6 Dec 2022
US seizes millions in stolen COVID relief funds by China-backed hackers
3.Policy & legislation

US seizes millions in stolen COVID relief funds by China-backed hackers

6 Dec 2022
Another Salesforce leader departs, will replace outbound Slack CEO
4.Careers & training

Another Salesforce leader departs, will replace outbound Slack CEO

6 Dec 2022
17 Windows 10 problems and how to fix them
6.operating systems

17 Windows 10 problems and how to fix them

24 Nov 2022
16 ways to speed up your laptop
7.Laptops

16 ways to speed up your laptop

5 Dec 2022
How to fix the Blue Screen of Death (BSOD) error in Windows 11
8.Microsoft Windows

How to fix the Blue Screen of Death (BSOD) error in Windows 11

22 Nov 2022
16 top BBC micro:bit projects
9.Hardware

16 top BBC micro:bit projects

28 Nov 2022
Microsoft: Russia increasingly timing cyber attacks with missile strikes in Ukraine
10.cyber warfare

Microsoft: Russia increasingly timing cyber attacks with missile strikes in Ukraine

5 Dec 2022

Resources

View All
An end-to-end roadmap for SMB cloud migration
whitepaper
Whitepaper

An end-to-end roadmap for SMB cloud migration

8 Dec 2022
Open the doors to the hybrid workplace with Microsoft secure remote desktops
whitepaper
Whitepaper

Open the doors to the hybrid workplace with Microsoft secure remote desktops

7 Dec 2022
How to build a multi-cloud strategy to meet your business goals
whitepaper
Whitepaper

How to build a multi-cloud strategy to meet your business goals

5 Dec 2022
Getting board-level buy-in for security strategy
whitepaper
Whitepaper

Getting board-level buy-in for security strategy

30 Nov 2022
Why developers are turning to ultra-powerful workstations for more creative freedom at less cost
whitepaper
Whitepaper

Why developers are turning to ultra-powerful workstations for more creative freedom at less cost

22 Nov 2022

In-Depth & Tutorials

View All
What SMEs can learn from the supercomputing revolution
Sponsored

What SMEs can learn from the supercomputing revolution

8 Dec 2022
What medium and large enterprises can learn from supercomputing
Sponsored

What medium and large enterprises can learn from supercomputing

6 Dec 2022
Larger monitors aren't all they're cracked up to be
monitors

Larger monitors aren't all they're cracked up to be

3 Dec 2022
Machine learning vs statistics: What’s the difference?
machine learning

Machine learning vs statistics: What’s the difference?

2 Dec 2022
What we can learn from the supercomputer revolution
Sponsored

What we can learn from the supercomputer revolution

1 Dec 2022

Latest Reviews

View All
Best Amazon Prime Day tech hardware deals
Hardware

Best Amazon Prime Day tech hardware deals

12 Jul 2022
Best Amazon Prime Day laptop deals
Laptops

Best Amazon Prime Day laptop deals

12 Jul 2022
Best Amazon Prime Day storage deals
Server & storage

Best Amazon Prime Day storage deals

12 Jul 2022
Vipre Endpoint Security Cloud review: A sound choice for SMBs with Windows and Mac users
cloud security

Vipre Endpoint Security Cloud review: A sound choice for SMBs with Windows and Mac users

8 Dec 2022
WatchGuard EPDR review: An incredible range of security measures
cloud security

WatchGuard EPDR review: An incredible range of security measures

6 Dec 2022

Podcasts

View All
Podcast transcript: Making sense of the telco transformation
Network & Internet

Podcast transcript: Making sense of the telco transformation

2 Dec 2022
Podcast transcript: The front line of fraud tech
cyber crime

Podcast transcript: The front line of fraud tech

29 Nov 2022
Podcast transcript: How secure is metaverse tech?
Security

Podcast transcript: How secure is metaverse tech?

18 Nov 2022
Podcast transcript: The rise of automated contracts
automation

Podcast transcript: The rise of automated contracts

11 Nov 2022
Podcast transcript: How can we make procurement smart?
logistics

Podcast transcript: How can we make procurement smart?

4 Nov 2022