IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Security

How we test: Security software
How we test: Security software
laptop security

How we test: Security software

Everything you need to know about our benchmarking process for antivirus products
21 Nov 2022
Seven realities facing SMBs as they enter a future of increased cyber threats
Whitepaper cover with female worker using a tablet stood in front of a serverwhitepaper
Whitepaper

Seven realities facing SMBs as they enter a future of increased cyber threats

2022 Intel Cybersecurity outlook for small and midsize businesses
21 Nov 2022
Google Cloud Platform now automatically detects highly common ransomware dropper
google cloud logo on statue
Cloud

Google Cloud Platform now automatically detects highly common ransomware dropper

Cobalt Strike is one of the most widely abused cyber security tools on the market and the latest measures aim to prevent cloud-based cyber attacks
21 Nov 2022
Lab-based cyber attacks are no serious threat – yet
A cyber security researcher at their desk
cyber security

Lab-based cyber attacks are no serious threat – yet

There’s no need to fret when it comes to research-based cyber security threats, but the future is a different matter
19 Nov 2022
The IT Pro Podcast: How secure is metaverse tech?
The IT Pro Podcast logo with the episode title 'How secure is metaverse tech?'
Security

The IT Pro Podcast: How secure is metaverse tech?

If we're not careful, the risks of this new frontier could outweigh the rewards
18 Nov 2022
Podcast transcript: How secure is metaverse tech?
The IT Pro Podcast logo with the episode title 'How secure is metaverse tech?''
Security

Podcast transcript: How secure is metaverse tech?

Read the full transcript for this episode of the IT Pro Podcast
18 Nov 2022
How to wipe a laptop easily and securely
A male hand switching on a laptop computer
Security

How to wipe a laptop easily and securely

A step-by-step guide on how to wipe a laptop safely, regardless of whether it's running Windows, Mac, or Linux
17 Nov 2022
Qatar World Cup apps prompt digital privacy warnings from regulators
Image of a decorative fixture outside one of the stadiums hosting the 2022 football World Cup in Qatar
Security

Qatar World Cup apps prompt digital privacy warnings from regulators

European regulators have voiced serious concerns over the permissions required by apps Ehteraz and Hayya
17 Nov 2022
Revealed: The top 200 most common passwords of 2022
A greyscale hand emerging from a hole, removing a password string, against a blue background
cyber security

Revealed: The top 200 most common passwords of 2022

While the most common passwords worldwide are largely the same, gender and region did have an effect on frequency
17 Nov 2022
US federal agency breached by Iranian state-backed hackers via Log4Shell exploit
The White House is the daytime
Security

US federal agency breached by Iranian state-backed hackers via Log4Shell exploit

The initial intrusion was discovered in February but a full incident response wasn't launched until June
17 Nov 2022
Hundreds of thousands of Emotet attacks spotted daily after four-month hiatus
Global map in black and red colour scheme denoting threat with plots in major cities to show cyber attacks being observed across the world
cyber attacks

Hundreds of thousands of Emotet attacks spotted daily after four-month hiatus

The botnet that refuses to die returns again and is equipped with new payloads and tactics to evade detection
16 Nov 2022
How to reduce cyber security costs for your business
Three colleagues in an IT team sitting around a monitor in an office
Security

How to reduce cyber security costs for your business

Nothing is off the table in a recession, but businesses must be careful to reduce cyber security costs without compromising on safety
16 Nov 2022
How to boot Windows 11 in Safe Mode
Screenshot of Windows 11's recovery settings menu
Microsoft Windows

How to boot Windows 11 in Safe Mode

Long-time Windows users will already be familiar with the feature, but novices may not be aware of how to boot in safe mode, especially in Windows 11
15 Nov 2022
Google agrees record $391.5m settlement in US digital tracking case
A Google kitchen area at one of its offices
privacy

Google agrees record $391.5m settlement in US digital tracking case

The sum represents the largest settlement ever paid in a US digital privacy case which dates back to 2018
15 Nov 2022
What is a router and how does it work?
A Wi-Fi router sat on a living room table
Network & Internet

What is a router and how does it work?

The role of a router in networking goes beyond simply allowing your business to access the web and stay connected with colleagues
15 Nov 2022
Australia considers ransomware payment ban, additional Medibank files leaked
The Australian coast, showing a beach and a city
Policy & legislation

Australia considers ransomware payment ban, additional Medibank files leaked

REvil has claimed responsibility for the attack amidst continued refusal by Medibank to pay the ransom
14 Nov 2022
The top 12 password-cracking techniques used by hackers
A list of poorly-constructed passwords on a notepad
Security

The top 12 password-cracking techniques used by hackers

Some of the most common, and most effective methods for stealing passwords
14 Nov 2022
How to react to a data breach
Open padlock on circuit board
Security

How to react to a data breach

Every business should have a data breach response plan, but when building one it can be difficult to know where to start
14 Nov 2022
Ransomware: Why do businesses still pay up?
A 2D mockup image of a business paying a cyber criminal for a ransom
ransomware

Ransomware: Why do businesses still pay up?

Despite the guidance and best practice, an alarming proportion of businesses hit with ransomware simply pay to make it go away
14 Nov 2022
The rising tide of no-hook phishing
An anonymous mobile phone user using their device in a darkened room
phishing

The rising tide of no-hook phishing

Not all phishing attacks rely on links or attachments, which means you’ll have to be extra careful
12 Nov 2022
Enabling secure hybrid learning in schools
Whitepaper cover with title over a sketch of shelves with red, blue, white, and yellow bookswhitepaper
Whitepaper

Enabling secure hybrid learning in schools

The importance of creating security awareness among key players
11 Nov 2022
NSA: Phase out memory-unsafe languages like C and C++
A close up shot of a computer screen showing lines of programming code
programming languages

NSA: Phase out memory-unsafe languages like C and C++

The US agency advises organisations to begin using languages like Rust, Java, and Swift
11 Nov 2022
Lenovo patches ThinkPad, Yoga, IdeaPad UEFI secure boot vulnerability
The Lenovo logo on a laptop, against a black background
vulnerability

Lenovo patches ThinkPad, Yoga, IdeaPad UEFI secure boot vulnerability

Mistakenly used drivers could allow hackers to modify the secure boot process
10 Nov 2022
GitHub launches private vulnerability reporting to secure the software supply chain
Welcome sign at GitHub Universe 2022
Security

GitHub launches private vulnerability reporting to secure the software supply chain

The new platform aims to simplify vulnerability disclosure and minimise instances where researchers avoid reporting out of personal convenience
10 Nov 2022