IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

information security (InfoSec)

What is cyber warfare?
A red world map with white pixels
Security

What is cyber warfare?

We explain what cyber warfare is and why you need to pay attention to the threats posed
20 May 2022
How to implement passwordless authentication
Digital fingerprint
Security

How to implement passwordless authentication

Worried about leaked credentials? We explain how to shut down the risk by ditching passwords entirely
30 Mar 2022
Vulnerability hunters are cut from a different cloth – they’re naturally inquisitive
Graphic of a hacker walking through a digital corridor
hacking

Vulnerability hunters are cut from a different cloth – they’re naturally inquisitive

So, you want to be a hacker? We share the best advice and resources for getting started
7 Mar 2022
Report: IT staff fail phishing tests more often than non-technical workers
phishing

Report: IT staff fail phishing tests more often than non-technical workers

Results show DevOps workers consistently rank among the most likely to fail a cyber security exercise
27 Jan 2022
Dark Souls servers taken offline after RCE flaw identified
Dark Souls Remastered artwork
vulnerability

Dark Souls servers taken offline after RCE flaw identified

Experts say PowerShell scripts could have been launched on other players' machines as a result
25 Jan 2022
Five things to consider before choosing an MFA solution
Image of two-factor authentication in action
Security

Five things to consider before choosing an MFA solution

Because we all should move on from using “password” as a password!
17 Dec 2021
Skip the three words thing, go straight for the ‘use a password manager, dammit’ jugular
Sticky notes on a monitor displaying assorted passwords
information security (InfoSec)

Skip the three words thing, go straight for the ‘use a password manager, dammit’ jugular

Why you can do so much better than the three-random-word rule that’s still being churned out by the NCSC
15 Dec 2021
CISA gives civilian agencies two weeks to patch recent security exploits
An abstract image showing a skull over a pixelated background to symbolise a cyber security vulnerability
vulnerability

CISA gives civilian agencies two weeks to patch recent security exploits

A total of 291 vulnerabilities have been detailed in an attempt to improve federal agency cyber security
4 Nov 2021
Celebrity data leaked after ransomware attack on London's Graff jewellers
Graff store in London
ransomware

Celebrity data leaked after ransomware attack on London's Graff jewellers

Russia-based Conti ransomware group is demanding tens of millions in cryptocurrency
1 Nov 2021
Microsoft Power Apps misconfiguration exposes 38 million records
The Microsoft Power Apps service on a smartphone
data breaches

Microsoft Power Apps misconfiguration exposes 38 million records

Sensitive data including contact tracing, COVID vaccine status as well as names and email addresses have been leaked
24 Aug 2021
Google bundles Android and web authentication APIs under one banner
The Google Identity Services branding
web development

Google bundles Android and web authentication APIs under one banner

Google Identity Services' SDK includes 'Sign in with Google' and 'One Tap' security tokens
4 Aug 2021
Kaspersky Password Manager generates passwords that can be 'cracked in seconds'
The Kaspersky website on a smartphone in a pocket
information security (InfoSec)

Kaspersky Password Manager generates passwords that can be 'cracked in seconds'

A now-patched vulnerability means specialised tools can game Kaspersky's method for creating passwords
7 Jul 2021
The complete guide to building a security awareness programme that works
Driving real behaviour change - whitepaper from Proofpoint - woman with scarf sitting at computerwhitepaper
Whitepaper

The complete guide to building a security awareness programme that works

How security leaders can drive real behaviour change
14 Jun 2021
DoJ shuts down infamous stolen credentials marketplace Slilpp
A person on a laptop to depict hacking
cyber crime

DoJ shuts down infamous stolen credentials marketplace Slilpp

The platform offered 80 million stolen credentials from roughly 1,400 banking and e-commerce providers, including Amazon and PayPal
11 Jun 2021
The IT Pro Podcast: Thinking differently about security
The IT Pro Podcast: Thinking differently about security
Security

The IT Pro Podcast: Thinking differently about security

How eBay Classifieds Group keeps its users secure in a changing world
30 Apr 2021
What is ethical hacking? White hat hackers explained
A graphic displaying an ethical hacker
hacking

What is ethical hacking? White hat hackers explained

Not all hackers are motivated by greed - some of them use their powers for good
9 Apr 2021
Meeting the data security challenge with Intel SGX
Abstract visualisation of padlock icon
Sponsored

Meeting the data security challenge with Intel SGX

Security needs to be the focus for the data-driven business, but that means protecting it while stored, in transit and in use
10 Mar 2021
SolarWinds blames intern for weak ‘solarwinds123’ password
A list of poorly-constructed passwords on a notepad
cyber attacks

SolarWinds blames intern for weak ‘solarwinds123’ password

The password ‘solarwinds123’ was publicly accessible on GitHub for more than a year and brought to the firm's attention in 2019
1 Mar 2021
What is WannaCry?
Somebody sitting at their desk in front of various devices that have been locked by WannaCry
WannaCry

What is WannaCry?

The full story behind one of the worst ransomware outbreaks in history
4 Feb 2021
What is cyber security?
Man in suit pressing padlocks in the shape of a cloud
Security

What is cyber security?

To learn what cyber security is, you also have to know what it's not
24 Sep 2020
Tesla wins case against ex-employee accused of stealing data
Tesla sign with logo
cyber crime

Tesla wins case against ex-employee accused of stealing data

The company celebrates its latest victory against Martin Tripp, who was accused of hacking and sharing sensitive information
18 Sep 2020
Safari vulnerability disclosed after Apple pushes fix to Spring 2021
The Safari logo displayed on an iPhone screen
vulnerability

Safari vulnerability disclosed after Apple pushes fix to Spring 2021

The Web Share API flaw can be exploited to attach system files, including web browsing history
25 Aug 2020
High-value financial accounts on sale for £400 on the dark web
A close-up shot of a login portal
cyber security

High-value financial accounts on sale for £400 on the dark web

Research finds more than 15 billion account credentials are being traded online, for £12 on average
8 Jul 2020