IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

malware

Defending against malware attacks starts here
Blue whitepaper cover with title and logo and digital cube image made up of smaller blocks, some containing a key graphicwhitepaper
Whitepaper

Defending against malware attacks starts here

The ultimate guide to building your malware defence strategy
15 Mar 2023
Brand-new Emotet campaign socially engineers its way from detection
Black screen with neon blue lines of code written across and a skull shape appears overlayed the code
cyber security

Brand-new Emotet campaign socially engineers its way from detection

This latest resurgence follows a three-month hiatus and tricks users into re-enabling dangerous VBA macros
14 Mar 2023
An in-depth analysis of the Microsoft 365 threat landscape
Dark whitepaper cover with title shown within a blue shield graphic with ring circling it, and logo at bottomwhitepaper
Whitepaper

An in-depth analysis of the Microsoft 365 threat landscape

Cyber security report 2023
8 Mar 2023
BlackLotus UEFI bootkit can break into fully patched Windows 11 PCs
Digital generated image of electronic circuit security padlock made out of numbers on black background.
Security

BlackLotus UEFI bootkit can break into fully patched Windows 11 PCs

First noticed in October and priced at £4,000, it's the first bootkit of its kind capable of bypassing UEFI Secure Boot
3 Mar 2023
How to turn on Windows Defender
Windows Defender notification on a screen
Software

How to turn on Windows Defender

Find out how to switch on Windows Defender in Windows 10 and Windows 11, and turn it off again if necessary
27 Feb 2023
What is hacktivism?
Two masked members of Anonymous demonstrating during the Occupy protest on October 15, 2011 in The Hague
hacking

What is hacktivism?

From Anonymous to the IT Army of Ukraine, we answer 'what is hacktivism' and guide you through the history of the most compelling corner of the tech i…
20 Feb 2023
What's the difference between antimalware and antivirus?
Black screen with neon blue lines of code written across and a skull shape appears overlayed the code
malware

What's the difference between antimalware and antivirus?

We help you navigate the worlds of antimalware and antivirus
10 Feb 2023
AWS malvertising campaign a “potent threat” to users, researchers warn
AWS advertisement close up in underground transit platform in NYC Subway Station
cyber attacks

AWS malvertising campaign a “potent threat” to users, researchers warn

The recent flurry of ‘malvertising’ attacks is raising concerns that users face heightened search engine risks
10 Feb 2023
Bitwarden users raise alarm over 'highly convincing' Google malvertising risks
Malware in code
Security

Bitwarden users raise alarm over 'highly convincing' Google malvertising risks

The volume of fake ads impersonating popular software has increased significantly in recent months
27 Jan 2023
Google Ads malvertising campaign prompts questions around Search security
The Google logo shown on a landscape phone, held by a hand in silhouette against a dark blue background
malware

Google Ads malvertising campaign prompts questions around Search security

A leading security researcher has called into question why Google still allows malware links to top search results
18 Jan 2023
'Highly evasive' polymorphic malware generated using ChatGPT
A close up image of red computer code on a black screen with the word malware displayed in white
malware

'Highly evasive' polymorphic malware generated using ChatGPT

Researchers at CyberArk Labs developed a novel method to generate malware using text that goes largely undetected by signature-based antimalware produ…
17 Jan 2023
Asian countries dominate list of least cyber-secure remote working locations
A businessman working remotely outdoors in sunny conditions
Security

Asian countries dominate list of least cyber-secure remote working locations

The research aimed to highlight the security risks of post-pandemic 'workations'
16 Dec 2022
Ransomware discovered carrying legitimate Windows certificates
A chained lock situated on a laptop displaying a red screen
malware

Ransomware discovered carrying legitimate Windows certificates

Sophos researchers pointed to the sophisticated signatures as a sign of a new, dangerous strategy by a group tied to Cuba
14 Dec 2022
New app store code of practice aims to strengthen ecosystem cyber security
Apple App Store logo on an iPhone display
cyber security

New app store code of practice aims to strengthen ecosystem cyber security

Developers and app store operators will be required to implement more robust security measures
9 Dec 2022
Google unearths Internet Explorer zero day exploited by North Korean hackers
The Internet Explorer icon as seen on a smartphone in behind a screen with lines of code
zero-day exploit

Google unearths Internet Explorer zero day exploited by North Korean hackers

The exploit was found after analysing malware embedded in documents targeting users in South Korea
8 Dec 2022
Microsoft: Russia increasingly timing cyber attacks with missile strikes in Ukraine
The Ukrainian flag generated digitally in the form of data
cyber warfare

Microsoft: Russia increasingly timing cyber attacks with missile strikes in Ukraine

The tech giant also warned that other European nations could be targeted by pro-Russian threat actors seeking to weaken supply chains
5 Dec 2022
'CryWiper' trojan disguises as ransomware, says Kaspersky
Toy horse on a digital screen to symbolise the attack of the Trojan virus
malware

'CryWiper' trojan disguises as ransomware, says Kaspersky

The destructive wiper mocks up files as if encrypted, while in reality overwriting all but core system files
2 Dec 2022
Best free malware removal tools in 2023
A close up image of red computer code on a black screen with the word malware displayed in white
Security

Best free malware removal tools in 2023

Worried your device is infected? Here are some of the best free malware removal tools at your disposal in 2023
28 Nov 2022
The top 12 password-cracking techniques used by hackers
A list of poorly-constructed passwords on a notepad
Security

The top 12 password-cracking techniques used by hackers

Knowing how to hack a password, or at least the methods used, could help you keep yours safe from predatory cyber criminals
14 Nov 2022
Microsoft: Raspberry Robin worm key facilitator of LockBit, Cl0p ransomware
A robin sitting on some grass with a worm in its mouth
ransomware

Microsoft: Raspberry Robin worm key facilitator of LockBit, Cl0p ransomware

The worm was first reported in May 2022 and has evolved into one of the largest malware distribution platforms currently active
28 Oct 2022
IT Pro News: Medibank cyber attack, Microsoft record cloud revenue, See Tickets data breach
A thumbnail for IT Pro News in Review showing the Microsoft, See Tickets, and Medibank logos overlaid on a dark backgroundwhitepaper
Business strategy

IT Pro News: Medibank cyber attack, Microsoft record cloud revenue, See Tickets data breach

Catch up on the biggest headlines of the week in just two minutes
28 Oct 2022
Microsoft warns of 'Prestige' ransomware targeting business in Ukraine, Poland
An abstract image showing a series of blue 1's and 0's with the word ransomware displayed in red in the middle
ransomware

Microsoft warns of 'Prestige' ransomware targeting business in Ukraine, Poland

The new strain appears to be operating independently of all known hacking groups currently in the region
17 Oct 2022
Best antivirus for Windows 10
Mockup of an antivirus product protecting a computer, with an 'IT Pro Recommended' award bade logo overlaid
antivirus

Best antivirus for Windows 10

Want to stay secure? Here's the best business-class protection around
13 Oct 2022