IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Security

Interpol arrests nearly 1,000 cyber criminals in months-long anti-fraud operation
Interpol sign on a glass building
cyber crime

Interpol arrests nearly 1,000 cyber criminals in months-long anti-fraud operation

Operation HAECHI-III sees the seizure of more than $130 million in virtual assets
25 Nov 2022
Avast Premium Business Security review: Feature-rich endpoint management for SMBs
Avast Premium Business Security interface
endpoint security

Avast Premium Business Security review: Feature-rich endpoint management for SMBs

Avast delivers a wealth of tough, easily managed endpoint protection measures at a good price
25 Nov 2022
Google rolls out patch for high-severity Chrome browser zero day
Google Chrome logo on a Chromebook
zero-day exploit

Google rolls out patch for high-severity Chrome browser zero day

It's the eighth time this year Google has been forced to address a zero-day vulnerability in its world-leading browser
25 Nov 2022
17 Windows 10 problems and how to fix them
Windows 10 error message displayed on a monitor
operating systems

17 Windows 10 problems and how to fix them

Tips and tricks to help you solve Windows 10 upgrade problems, for everything from freeing up storage, to solving privacy errors and using safe mode
24 Nov 2022
Japan considers creating new cyber defence agency as attacks ramp up in region
A digital map of Japan
cyber attacks

Japan considers creating new cyber defence agency as attacks ramp up in region

The country may be looking to ramp up its defences as Asia was the most-attacked global region in 2021, according to one report
24 Nov 2022
Pro-Russia Killnet hackers claim DDoS attack on EU Parliament website
EU parliament
cyber attacks

Pro-Russia Killnet hackers claim DDoS attack on EU Parliament website

The attack was launched shortly after MEPs voted to brand Russia a state-sponsor of terrorism for its invasion of Ukraine
24 Nov 2022
What is data and big data mining? An easy guide
Graphic of data mining being shown on a virtual circuit board beside a businessman
Business strategy

What is data and big data mining? An easy guide

You have a lot of data, but how do you find the right data to make a business decision?
23 Nov 2022
Wipro launches European cyber security consultancy services
A smartphone resting on a laptop keyboard with the Wipro logo displayed on screen
Security

Wipro launches European cyber security consultancy services

The new end-to-end offering follows a string of global acquisitions for Wipro in the consulting space
23 Nov 2022
2022 IBM's Security X-Force cloud threat landscape report
Whitepaper cover with image of a cloud with seven arrows over it pointing upwardswhitepaper
Whitepaper

2022 IBM's Security X-Force cloud threat landscape report

Recommendations for preparing and responding to cloud breaches
22 Nov 2022
How to fix the Blue Screen of Death (BSOD) error in Windows 11
A screenshot of the Blue Screen of Death error in Microsoft Windows 11
Microsoft Windows

How to fix the Blue Screen of Death (BSOD) error in Windows 11

Encountering Windows' dreaded 'blue screen of death' error is never fun, but it's possible to diagnose the problem with a few simple steps
22 Nov 2022
2022 Magic quadrant for Security Information and Event Management (SIEM)
Whitepaper cover with title, text, and SWOT analysis chartwhitepaper
Whitepaper

2022 Magic quadrant for Security Information and Event Management (SIEM)

SIEM is evolving into a security platform with multiple features and deployment models
22 Nov 2022
How we test: Security software
How we test: Security software
laptop security

How we test: Security software

Everything you need to know about our benchmarking process for antivirus products
21 Nov 2022
Seven realities facing SMBs as they enter a future of increased cyber threats
Whitepaper cover with female worker using a tablet stood in front of a serverwhitepaper
Whitepaper

Seven realities facing SMBs as they enter a future of increased cyber threats

2022 Intel Cybersecurity outlook for small and midsize businesses
21 Nov 2022
Google Cloud Platform now automatically detects highly common ransomware dropper
google cloud logo on statue
Cloud

Google Cloud Platform now automatically detects highly common ransomware dropper

Cobalt Strike is one of the most widely abused cyber security tools on the market and the latest measures aim to prevent cloud-based cyber attacks
21 Nov 2022
Lab-based cyber attacks are no serious threat – yet
A cyber security researcher at their desk
cyber security

Lab-based cyber attacks are no serious threat – yet

There’s no need to fret when it comes to research-based cyber security threats, but the future is a different matter
19 Nov 2022
The IT Pro Podcast: How secure is metaverse tech?
The IT Pro Podcast logo with the episode title 'How secure is metaverse tech?'
Security

The IT Pro Podcast: How secure is metaverse tech?

If we're not careful, the risks of this new frontier could outweigh the rewards
18 Nov 2022
Podcast transcript: How secure is metaverse tech?
The IT Pro Podcast logo with the episode title 'How secure is metaverse tech?''
Security

Podcast transcript: How secure is metaverse tech?

Read the full transcript for this episode of the IT Pro Podcast
18 Nov 2022
How to wipe a laptop easily and securely
A male hand switching on a laptop computer
Security

How to wipe a laptop easily and securely

A step-by-step guide on how to wipe a laptop safely, regardless of whether it's running Windows, Mac, or Linux
17 Nov 2022
Qatar World Cup apps prompt digital privacy warnings from regulators
Image of a decorative fixture outside one of the stadiums hosting the 2022 football World Cup in Qatar
Security

Qatar World Cup apps prompt digital privacy warnings from regulators

European regulators have voiced serious concerns over the permissions required by apps Ehteraz and Hayya
17 Nov 2022
Revealed: The top 200 most common passwords of 2022
A greyscale hand emerging from a hole, removing a password string, against a blue background
cyber security

Revealed: The top 200 most common passwords of 2022

While the most common passwords worldwide are largely the same, gender and region did have an effect on frequency
17 Nov 2022
US federal agency breached by Iranian state-backed hackers via Log4Shell exploit
The White House is the daytime
Security

US federal agency breached by Iranian state-backed hackers via Log4Shell exploit

The initial intrusion was discovered in February but a full incident response wasn't launched until June
17 Nov 2022
Hundreds of thousands of Emotet attacks spotted daily after four-month hiatus
Global map in black and red colour scheme denoting threat with plots in major cities to show cyber attacks being observed across the world
cyber attacks

Hundreds of thousands of Emotet attacks spotted daily after four-month hiatus

The botnet that refuses to die returns again and is equipped with new payloads and tactics to evade detection
16 Nov 2022
How to reduce cyber security costs for your business
Three colleagues in an IT team sitting around a monitor in an office
Security

How to reduce cyber security costs for your business

Nothing is off the table in a recession, but businesses must be careful to reduce cyber security costs without compromising on safety
16 Nov 2022