IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more
Connor Jones

Connor Jones is a Staff Writer at IT Pro covering cyber security, software development, and AI/ML. He’s a full-purpose journalist who reports breaking news, in-depth feature writing, hardware reviews, and multimedia journalism while dabbling in software development in his free time.

Proudly trained at the University of Sheffield's UK-leading journalism department, he holds a master’s degree in Magazine Journalism and a bachelor’s degree in English Language from Sheffield Hallam University.

Connor first joined IT Pro in 2018 as a graduate and returned in 2021 following a brief spell in PR. He got his first break in journalism after being scouted by Red Bull Esports for the role of contributing Counter-Strike Expert and has gone on to write for a range of top publications including UNILAD Tech.

You can reach Connor at connor.jones@futurenet.com or on Twitter at @ConnorLBJones 

Red Hat and Samsung agree landmark software deal to develop next-gen storage
Samsung and Red Hat representatives meet to announce partnership
open source

Red Hat and Samsung agree landmark software deal to develop next-gen storage

The partnership is a first for Samsung as the companies commit to developing memory software designs that can keep up with emerging tech
25 May 2022
Microsoft finally adds Power BI integrations to PowerPoint and Outlook
Woman leads a presentation in a meeting room
business intelligence (BI)

Microsoft finally adds Power BI integrations to PowerPoint and Outlook

Businesses can now add live Power BI feeds to presentations and manipulate data points on the fly
25 May 2022
Microsoft launches low-code Power Pages for 'intuitive' web development
View of a Microsoft building
web development

Microsoft launches low-code Power Pages for 'intuitive' web development

The new platform builds on Power Apps, introduces new features, and has already been used by a Five Eyes government for a large-scale visa project
24 May 2022
Open source packages with millions of installs hacked to harvest AWS credentials
A screen showing code written in Python
hacking

Open source packages with millions of installs hacked to harvest AWS credentials

Two popular open source packages used by Python and PHP developers have been quietly compromised with successful attacks already being reported
24 May 2022
Major cut-price acquisitions are expected in 2022 as tech stocks plummet
Wall Street road sign
mergers and acquisitions

Major cut-price acquisitions are expected in 2022 as tech stocks plummet

The 'great tech stock selloff' is well underway as investors get jittery over rising interest rates
23 May 2022
Windows 11's nifty new search feature has one major downside
Windows 11 splash screen
Microsoft Windows

Windows 11's nifty new search feature has one major downside

Bringing inspiration from Android, the new search feature has divided onlookers
23 May 2022
Ethical hackers handed lifeline in controversial US cyber crime review
Graphical mockup of a piece of software being tested for vulnerabilities
ethical hacking

Ethical hackers handed lifeline in controversial US cyber crime review

The DoJ's latest ruling is a boon to "good-faith security research" but some argue that white hats are still not protected
20 May 2022
QNAP NAS drives targeted by DeadBolt ransomware for the third time this year
Visual representation of ransomware by showing encrypted files on a display
ransomware

QNAP NAS drives targeted by DeadBolt ransomware for the third time this year

The ransomware strain is back and equipped with stronger cryptography for more effective attacks
20 May 2022
Apple "completely redesigns" IT certifications, introduces two new exams
A laptop and smartphone both showing the homepage for Apple's new IT certifications programme
Careers & training

Apple "completely redesigns" IT certifications, introduces two new exams

The format has changed to better suit remote learning as demand for Apple admins grows
19 May 2022
Ukraine's vigilante IT army now has a DDoS bot to automate attacks against Russia
The Ukrainian flag generated digitally in the form of data
botnets

Ukraine's vigilante IT army now has a DDoS bot to automate attacks against Russia

The 270,000-strong IT Army of Ukraine will now combine supporters' cloud infrastructure to strengthen the daily attacks against their invaders
19 May 2022
US security agency issues emergency alert over vulnerable VMware products
The VMware website as seen through a magnifying glass against a monitor
Security

US security agency issues emergency alert over vulnerable VMware products

A string of actively exploited critical vulnerabilities across five popular VMware products has been described as an "unacceptable risk" to government…
19 May 2022
Researchers demonstrate how to install malware on iPhone after it's switched off
Apple logo on the side of a building
Security

Researchers demonstrate how to install malware on iPhone after it's switched off

The most recent iPhones are found to be vulnerable after researchers discover an exploit in a beloved iOS 15 feature
18 May 2022
Ministry of Defence pledges resilience to all known vulnerabilities and cyber attack methods by 2030
Ministry of Defence sign in London
Security

Ministry of Defence pledges resilience to all known vulnerabilities and cyber attack methods by 2030

New MoD cyber security strategy is underpinned by a 'secure by design' approach that will run across the organisation
18 May 2022
(ISC)2 launches free scheme to get 100,000 UK citizens into cyber security
An IT team in an office busy at work
Careers & training

(ISC)2 launches free scheme to get 100,000 UK citizens into cyber security

The certification non-profit estimates the UK has around 33,000 cyber security vacancies, with that figure set to rise this year
17 May 2022
US indicts heart doctor for allegedly spearheading high-profile ransomware operations
Male hacker hand on laptop computer keyboard with red binary screen of ransomware attack
ransomware

US indicts heart doctor for allegedly spearheading high-profile ransomware operations

The 55-year-old cardiologist profited from a ransomware side hustle and coached would-be hackers in using his tools for maximum rewards
17 May 2022
Microsoft warns of new botnet variant targeting Windows and Linux systems
Image of small robots connected to represent a botnet
Security

Microsoft warns of new botnet variant targeting Windows and Linux systems

The Sysrv botnet is back and equipped with more exploits though the primary goal of installing cryptominers remains the same
16 May 2022
Russian hackers declare war on 10 countries after failed Eurovision DDoS attack
Flag of Russia on a computer binary codes falling from the top and fading away
hacking

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack

Italian police thwart cyber attacks on Eurovision's voting systems from the Russian-linked hacker group Killnet after the same group targeted public s…
16 May 2022
Tool that scans office software for vulnerabilities finds almost 100 in Word and Acrobat
An unlocked padlock resting on a keyboard in front of a red backdrop
Security

Tool that scans office software for vulnerabilities finds almost 100 in Word and Acrobat

Myriad flaws in Microsoft Word, Adobe Acrobat, and Foxit Reader were discovered as part of the research project that netted $22,000 in bug bounty rewa…
13 May 2022
Lone Russian RAT operator rivals large gangs with £5 "passion project"
Russian hacking on a laptop mockup with code sprawling over the screen
malware

Lone Russian RAT operator rivals large gangs with £5 "passion project"

Researchers say the lone actor's success speaks to the growing complexity of the underground malware market
13 May 2022
Windows Server admins say latest Patch Tuesday broke authentication policies
Image of a server rack with lens flare on the corner of the image
Server & storage

Windows Server admins say latest Patch Tuesday broke authentication policies

Microsoft has issued a workaround for the certificate-mapping issue, but many have already rolled back the updates to avoid operational disruption
12 May 2022
WannaCry's ghost is still wreaking havoc
Abstract image of a ghost on a digital screen
ransomware

WannaCry's ghost is still wreaking havoc

A retooled version of the infamous ransomware strain continues to haunt corporate networks around the world
12 May 2022
Five Eyes leaders issue guidance for MSPs to prevent second SolarWinds attack
A group of hackers behind the Russian flag
Security

Five Eyes leaders issue guidance for MSPs to prevent second SolarWinds attack

The joint advisory published today said MSPs and customers need more vigilant in the wake of Russia's invasion of Ukraine
11 May 2022
Actively exploited Windows vulnerability reaches peak severity when paired with popular attack
Windows 11 and Windows 11 displayed on two different laptops
Security

Actively exploited Windows vulnerability reaches peak severity when paired with popular attack

May 2022's routine Patch Tuesday fixes seven 'critical' issues, including a familiar headache for IT administrators
11 May 2022
Five Eyes and US governments finally confirm Russia was behind Ukrainian government, Viasat cyber attacks
Lizz Truss headshot, wearing a remembrance day poppy
cyber attacks

Five Eyes and US governments finally confirm Russia was behind Ukrainian government, Viasat cyber attacks

NCSC detailed the government-level attribution process at CYBERUK 2022 and why it took so much longer to assign blame compared to the private sector
10 May 2022
National security leaders fear Ukraine conflict could inform a 'blueprint' for cyber war
ICC building in Newport - the venue for CYBERUK 2022
Security

National security leaders fear Ukraine conflict could inform a 'blueprint' for cyber war

Learning from the successes and failures of the ongoing conflict could help foreign adversaries carry out more effective cyber attacks in the future, …
10 May 2022
NCSC unveils email security-checking tool for private sector organisations at CYBERUK
An image showing the NCSC logo on its website under a magnifying glass
National Cyber Security Centre (NCSC)

NCSC unveils email security-checking tool for private sector organisations at CYBERUK

The free service will focus on checking for TLS and DMARC compliance to protect against anti-spoofing and email hijacking
10 May 2022
Microsoft announces new business security services led by in-house experts
A shield with a keyhole on a radar system denoting cyber security
enterprise security

Microsoft announces new business security services led by in-house experts

The new services will see Microsoft's security experts providing hands-on, proactive threat hunting for businesses unable to fully build out a SOC due…
9 May 2022
Google Cloud confirms it is building a dedicated team to support Web3 developers
Close up of Google Cloud sign displayed at the entrance to its headquarters in Silicon Valley; South San Francisco bay area
Cloud

Google Cloud confirms it is building a dedicated team to support Web3 developers

Google Cloud's new team will focus on helping developers build new projects around decentralised technologies such as blockchain, cryptocurrency, and …
9 May 2022
Landmark amendments to international cyber crime treaty set to be signed next week
Marija Pejcinovic Buric, the Council of Europe Secretary General, speaks at the Council of Europe
cyber crime

Landmark amendments to international cyber crime treaty set to be signed next week

It's only the second amendment to the historically significant Budapest Convention since it was introduced in 2001
6 May 2022
Big tech firms struggle to recover after NASDAQ slump
Wall Street road sign
Technology

Big tech firms struggle to recover after NASDAQ slump

Looming threats of rising interest rates and inflation have further driven investors away from tech and onto safer bets
6 May 2022
Best laptops for programming and coding in 2022
A female programmer working in front of a big monitor displaying code
Laptops

Best laptops for programming and coding in 2022

There are so many factors to consider when choosing the perfect computer for a programmer or software developer. We break them down and offer suggesti…
5 May 2022
Cisco develops technology to predict network issues before they happen
Cisco's headquarters in the US
Network & Internet

Cisco develops technology to predict network issues before they happen

The networking giant has spent two years developing the new engine that will be slowly rolled out across its product portfolio
5 May 2022
Researcher discovers simple tweak that neutralises Conti, REvil, WannaCry attacks
Ransomware on a red screen
ransomware

Researcher discovers simple tweak that neutralises Conti, REvil, WannaCry attacks

This one trick can stop ransomware executing file encryption
4 May 2022
SMBs expected to suffer as cyber security salaries equalise across the UK
Mockup of a virtual environment in which a recruiter is choosing between different candidates represented by silhouettes
Security

SMBs expected to suffer as cyber security salaries equalise across the UK

Smaller businesses stand to lose out on top talent as post-pandemic hybrid and remote working setups drive salaries closer to London levels
4 May 2022
Rental car company Sixt confirms cyber attack, leaves scores of UK customers in the dark
Sixt rental car company signs affixed to a ceiling
cyber attacks

Rental car company Sixt confirms cyber attack, leaves scores of UK customers in the dark

The rental car giant announced a cyber attack on Sunday and has been largely uncontactable for days, but insists disruption is temporary and minimal
3 May 2022
Laptop vs Chromebook for work: Which one is better for office use?
Chomebook being held by a man in a business suit
Laptops

Laptop vs Chromebook for work: Which one is better for office use?

Both computers are technically laptops, but one crucial difference means these machines are worlds apart
3 May 2022