Explore Security
Security
Latest about Security
![Concept art showing DDoS attacks on global network infrastructure sites on a digitized map of the globe.](https://cdn.mos.cms.futurecdn.net/nWn4rKFahJ7cHKE4Zqp7WL-320-80.jpg)
DDoS attacks have doubled so far in 2024
By Emma Woollacott published
News Research on DDoS attacks from Imperva identified two new major application layer attack vectors, while DNS attacks have skyrocketed
![Concept image showing two cybersecurity workers in a dimly lit room symbolizing CISA hackers.](https://cdn.mos.cms.futurecdn.net/o4bPVFNtxNhLFRpb9KcQwi-320-80.jpg)
CISA breached a federal agency as part of its red team program — and nobody noticed for five months
By Solomon Klappholz published
News A red team assessment performed by CISA on an unnamed federal agency found a series of critical security weaknesses
![Jen Easterly, director of the Cybersecurity and Infrastructure Security Agency, testifies before a House Homeland Security Subcommittee. She is sat at a committee table with three people sat behind her and portraits on the wall in the background.](https://cdn.mos.cms.futurecdn.net/TKbEgBma2NsJWh2H3qqkjW-320-80.jpg)
What is the Cybersecurity and Infrastructure Security Agency (CISA) and what does it do?
By Ross Kelly published
Explainer CISA plays a critical role in keeping US organizations safe from cyber attacks, providing vital advice and threat information
![Digital background depicting innovative technologies in security systems, data protection Internet technologies](https://cdn.mos.cms.futurecdn.net/BTuf6o9qJxeZguE2M8oJfg-320-80.jpg)
Half of Australia’s population was exposed in the MediSecure breach, but victims might never know if they’re affected
By Solomon Klappholz published
News Financial difficulties at MediSecure mean it doesn’t have the resources to establish exactly who was impacted in a recent breach and what data was stolen
![A close up of a person's hand hovering over the delete button on a silver-coloured laptop](https://cdn.mos.cms.futurecdn.net/bY8jPUxtaUqMt5yxyrm7aB-320-80.jpg)
How to wipe a laptop easily and securely
By Keumars Afifi-Sabet last updated
In-depth A step-by-step guide on how to wipe a laptop safely, whether it's running Windows, macOS, or Linux
![Mockup of a padlock covered in blue and red neon code denoting ransomware, malware, and security](https://cdn.mos.cms.futurecdn.net/L6DSTHdion3mCrSBkWnF9C-320-80.jpg)
How IT leaders can respond to the evolution of ransomware
By Peter Ray Allison published
With a proper strategy for response, communication, and recovery, leaders can respond for the evolution of ransomware and ensure staff are prepared for the worst
![Screenshot of the Windows recovery settings menu that allows users to open Windows 11 Safe Mode](https://cdn.mos.cms.futurecdn.net/kHL69Bux4BrtcZrT3yrzC9-320-80.png)
How to boot into Windows 11 Safe Mode
By Chris Merriman last updated
In-depth Long-time Windows users will already be familiar with Windows 11 Safe Mode, but what exactly is it for and how do you boot your system into it?
![King Charles III pictured in the House of Lords during the 2024 King's Speech.](https://cdn.mos.cms.futurecdn.net/S6teY6RtRXhsseJjDFxCwY-320-80.jpg)
King’s Speech: Security in the spotlight as government promises new efforts to lock down insecure IT supply chains
By Solomon Klappholz published
News The new Labour government has promised fresh cybersecurity legislation aimed at minimizing supply chain risk and improving incident reporting
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.