Hacking
Discover expert analysis on hacking with news, features and insights from the team at IT Pro.
-
How does a SQL injection attack work?In-depth Understanding one of the simplest, yet most effective, methods of cyber attack
By Adam Shepherd Last updated
In-depth -
The rise of double extortion ransomwareIn-depth With the use of this tactic increasing, we look at how you can protect your business
By Carly Page Last updated
In-depth -
What is ransomware?In-depth This type of malware could hit you hard in the pocket
By Dale Walker Last updated
In-depth -
Data was likely leaked in council hackNews London council warns data was copied in last week's attack
By Nicole Kobie Published
News -
Best online cyber security coursesBest Boost your cyber skills or launch a security career with the best online courses handpicked for beginners and seasoned professionals alike
By Solomon Klappholz Last updated
Best -
What is a Trojan?In-depth The malicious malware lurks behind legitimate software to invade your computer
By Nicholas Fearn Last updated
In-depth -
What is two-factor authentication?In-depth Passwords aren't secure; it's time to add multi-factor authentication
By Keumars Afifi-Sabet Last updated
In-depth -
What is a rootkit?In-depth We look at this malicious tool and how to detect and remove it
By Rene Millman Last updated
In-depth -
Hacking is not a crime, criminal activity isOpinion We need to be clearer about the difference between hacking and cyber crime
By Davey Winder Published
Opinion -
Why the Space Force wants white hats to attack a satelliteCase study Authorities hope the first-of-its-kind competition could bring benefits to the cyber sector
By James O'Malley Published
Case study -
Two-thirds of ethical hackers using generative AI in bug huntingNews The report found that more and more ethical hackers are leveraging generative AI tools
By Ross Kelly Published
News -
How do hackers choose their targets?In-depth We explore what goes on in the minds of cyber criminals
By Adam Shepherd Last updated
In-depth