Security
Discover expert analysis on security with news, features and insights from the team at IT Pro.
Explore Security
-

What is a DDoS attack?
In-depth Criminals are building armies of digital zombies that can be trained on your business – how worried should you be?
By Siobhan Conners Last updated
In-depth -

The rise of double extortion ransomware
In-depth With the use of this tactic increasing, we look at how you can protect your business
By Carly Page Last updated
In-depth -

Tomorrow's fraud techniques
ITPro Podcast Leaders need to proactive as attackers launch more consistent, sophisticated attacks
By Rory Bathgate Published
ITPro Podcast -

Interpol teams up with tech firms to seize 45,000 malicious IPs, servers in global cyber crime crackdown
News Operation Synergia III saw 94 arrests - and counting - with malicious IP addresses used in phishing and fraud schemes seized
By Emma Woollacott Published
News -

More than 12 million enterprise Linux systems are vulnerable to root access
News Researchers have warned Linux flaws allow unprivileged local users to gain root privileges and weaken container isolation
By Emma Woollacott Published
News -

AutoCAD Users may have a ransomware problem – here's what they can do
In-depth A new malware family is currently using the same file types as the professional design software AutoCAD
By Peter Ray Allison Published
In-depth -

What is ransomware?
In-depth This type of malware could hit you hard in the pocket
By Dale Walker Last updated
In-depth -

Security experts weigh in on motivation behind Stryker cyber attack
News The attack on medical tech company Stryker has severely impacted operations globally
By Ross Kelly Published
News -

The rise of PhaaS: what businesses should know
In-depth With phishing as a service (PhaaS) on the rise, which new kits should firms know about and how can leaders avoid being caught out?
By Kate O'Flaherty Published
In-depth -

Thousands of Asus routers are being used to fuel a massive cyber crime spree
News Black Lotus Labs has spotted a massive botnet of Asus routers built by malware that uses a common peer networking tool
By Nicole Kobie Published
News -

How resellers can win with smarter Multi-Factor Authentication (MFA)
Industry Insights Enhanced and phishing-resistant MFA prevents MFA bombing and fatigue
By Michael Downs Published
Industry Insights -

Sectigo taps Clint Maddox to lead global field operations
Reviews The appointment follows a year of strong momentum for the security vendor as it expands its global channel footprint
By Daniel Todd Published
Reviews