Android users told to be on high alert after Cerberus banking Trojan leaks to the dark web
trojans

Android users told to be on high alert after Cerberus banking Trojan leaks to the dark web

The source code for the authenticator-breaking malware is available for free on underground forums
18 Sep 2020
What is 6G and how far are we from rollout?
Network & Internet

What is 6G and how far are we from rollout?

Everything you need to know about 6G mobile connectivity
18 Sep 2020
Big data is 'giving us an edge over hackers' for the first time, says Microsoft CISO
Security

Big data is 'giving us an edge over hackers' for the first time, says Microsoft CISO

Massive amounts of network, endpoint, application and identity signals are being used to train machine learning models and improve detection
17 Sep 2020
IT Pro 20/20: The learning revolution starts now
Careers & training

IT Pro 20/20: The learning revolution starts now

The eighth issue of IT Pro 20/20 looks at the rise of self-education during a global pandemic
1 Sep 2020

Latest News

View all
MarqVision detects counterfeit products with deep learning and AI
intellectual property

MarqVision detects counterfeit products with deep learning and AI

Beta clients have experienced a 30-fold efficiency increase in anti-counterfeiting efforts
18 Sep 2020
Ban on TikTok and WeChat downloads begin Sunday
Policy & legislation

Ban on TikTok and WeChat downloads begin Sunday

Apps will be removed from app stores, but U.S. users won’t be penalized for use of either app
18 Sep 2020
Tesla wins case against ex-employee accused of stealing data
cyber crime

Tesla wins case against ex-employee accused of stealing data

The company celebrates its latest victory against Martin Tripp, who was accused of hacking and sharing sensitive information
18 Sep 2020
Android users told to be on high alert after Cerberus banking Trojan leaks to the dark web
trojans

Android users told to be on high alert after Cerberus banking Trojan leaks to the dark web

The source code for the authenticator-breaking malware is available for free on underground forums
18 Sep 2020

Most Popular

Accenture ploughs $3 billion into cloud migration support group
1.digital transformation

Accenture ploughs $3 billion into cloud migration support group

17 Sep 2020
Google takes on Zoom with launch of Meet hardware
2.video conferencing

Google takes on Zoom with launch of Meet hardware

16 Sep 2020
16 ways to speed up your laptop
3.Laptops

16 ways to speed up your laptop

16 Sep 2020
Dell plans to axe more jobs in bid to cut costs
4.business management

Dell plans to axe more jobs in bid to cut costs

15 Sep 2020
MFA bypass allows hackers to infiltrate Microsoft 365
6.cloud security

MFA bypass allows hackers to infiltrate Microsoft 365

15 Sep 2020
Microsoft open-sources fuzzing tool used for bug-ridden Windows 10
7.software development

Microsoft open-sources fuzzing tool used for bug-ridden Windows 10

16 Sep 2020
Arm employees "fobbed off" over Nvidia takeover, says Unite
8.mergers and acquisitions

Arm employees "fobbed off" over Nvidia takeover, says Unite

16 Sep 2020
What is cache memory?
9.data processing

What is cache memory?

14 Sep 2020
Big data is 'giving us an edge over hackers' for the first time, says Microsoft CISO
10.Security

Big data is 'giving us an edge over hackers' for the first time, says Microsoft CISO

17 Sep 2020

Resources

Changing spots: How to reinvent your business
business managementwhitepaper

Changing spots: How to reinvent your business

18 Sep 2020
Why engineering teams love Slack
business communicationswhitepaper

Why engineering teams love Slack

17 Sep 2020
Navigating the disruption of work
business communicationswhitepaper

Navigating the disruption of work

17 Sep 2020
Choosing a collaboration platform
business communicationswhitepaper

Choosing a collaboration platform

17 Sep 2020
Intelligent process automation
artificial intelligence (AI)whitepaper

Intelligent process automation

17 Sep 2020

In-Depth & Tutorials

View all
What's next for sustainable computing?
energy efficiency

What's next for sustainable computing?

18 Sep 2020
What is 6G and how far are we from rollout?
Network & Internet

What is 6G and how far are we from rollout?

18 Sep 2020
How to protect against a DDoS attack
Security

How to protect against a DDoS attack

17 Sep 2020
What to look for in a mesh Wi-Fi network
wifi & hotspots

What to look for in a mesh Wi-Fi network

16 Sep 2020
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

16 Sep 2020

Latest Reviews

View all
Google Pixel 4a review: A picture-perfect package
Google Android

Google Pixel 4a review: A picture-perfect package

18 Sep 2020
Acer ET241Y review: Exceptional value
monitors

Acer ET241Y review: Exceptional value

17 Sep 2020
Asus ZenWiFi AC review: Boxy but brilliant
wifi & hotspots

Asus ZenWiFi AC review: Boxy but brilliant

16 Sep 2020
Philips Brilliance 346P1CRH review: A true productivity powerhouse
monitors

Philips Brilliance 346P1CRH review: A true productivity powerhouse

11 Sep 2020
Oppo Find X2 Lite review: 5G for the masses
Mobile Phones

Oppo Find X2 Lite review: 5G for the masses

10 Sep 2020

Podcasts

View all
The IT Pro Podcast: Will VR ever be mainstream?
Technology

The IT Pro Podcast: Will VR ever be mainstream?

17 Sep 2020
The IT Pro Podcast: The myth of reputational damage
data breaches

The IT Pro Podcast: The myth of reputational damage

10 Sep 2020
The IT Pro Podcast: Cyber security post-Brexit
cyber security

The IT Pro Podcast: Cyber security post-Brexit

4 Sep 2020
The IT Pro Podcast: The DARQ side of security
Technology

The IT Pro Podcast: The DARQ side of security

28 Aug 2020
The IT Pro Podcast: Is AI the snake oil of the 21st century?
artificial intelligence (AI)

The IT Pro Podcast: Is AI the snake oil of the 21st century?

21 Aug 2020

IT Pro 20/20

View all
IT Pro 20/20: The learning revolution starts now
Careers & training

IT Pro 20/20: The learning revolution starts now

1 Sep 2020
IT Pro 20/20: Small businesses will lead the new normal
SMB

IT Pro 20/20: Small businesses will lead the new normal

3 Aug 2020
IT Pro 20/20: A quantum leap for security
cyber security

IT Pro 20/20: A quantum leap for security

30 Jun 2020
IT Pro 20/20: How regulation is shaping innovation
Policy & legislation

IT Pro 20/20: How regulation is shaping innovation

29 May 2020
IT Pro 20/20: Living at the mercy of technology
artificial intelligence (AI)

IT Pro 20/20: Living at the mercy of technology

1 May 2020

Videos

View all
IT Pro Live: How virtual reality will power Workplace 2.0
Technology

IT Pro Live: How virtual reality will power Workplace 2.0

1 Sep 2020
IT Pro Live: Compute from beyond the data centre
Infrastructure

IT Pro Live: Compute from beyond the data centre

1 Sep 2020
IT Pro Live: Why 'on-premise' isn't a dirty word
Server & storage

IT Pro Live: Why 'on-premise' isn't a dirty word

1 Sep 2020
IT Pro Live: The Now and the Next
Technology

IT Pro Live: The Now and the Next

1 Sep 2020
IT Pro Live: Scaling enterprise DevOps with a platform team approach
DevOps

IT Pro Live: Scaling enterprise DevOps with a platform team approach

1 Sep 2020