IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more
Connor Jones

Connor Jones is a Staff Writer at IT Pro covering cyber security, software development, and AI/ML. He’s a full-purpose journalist who reports breaking news, in-depth feature writing, hardware reviews, and multimedia journalism while dabbling in software development in his free time.

Proudly trained at the University of Sheffield's UK-leading journalism department, he holds a master’s degree in Magazine Journalism and a bachelor’s degree in English Language from Sheffield Hallam University.

Connor first joined IT Pro in 2018 as a graduate and returned in 2021 following a brief spell in PR. He got his first break in journalism after being scouted by Red Bull Esports for the role of contributing Counter-Strike Expert and has gone on to write for a range of top publications including UNILAD Tech.

You can reach Connor at connor.jones@futurenet.com or on Twitter at @ConnorLBJones 

The top programming languages you need to learn for 2022
A computer screen with a grey background showing lines of multi-coloured Python code
Careers & training

The top programming languages you need to learn for 2022

With hundreds of coding languages out there, which ones will earn you the most?
23 Jun 2022
Salaries for the least popular programming languages surge as much as 44%
Mocked up images of hundred-dollar bills appearing next to each other, filling the image
Development

Salaries for the least popular programming languages surge as much as 44%

The latest annual Stack Overflow developer survey shows salaries for top paying languages have largely plateaued
23 Jun 2022
'Embrace PowerShell for better security', say UK, US, NZ cyber authorities
Two screens showing computer code with a red box displaying the word 'PowerShell'
Microsoft Windows

'Embrace PowerShell for better security', say UK, US, NZ cyber authorities

The powerful automation and IT administrative tool has been used by hackers as an attack tool, but proper configuration can take the power out of thei…
23 Jun 2022
Making the most of Disk Management on Windows 10
A close up image of a hard disk
Microsoft Windows

Making the most of Disk Management on Windows 10

We look at why disk management in Windows 10 is important, how to do it, and its benefits
22 Jun 2022
Windows vs Linux: what's the best operating system?
Abstract image showing logos for Microsoft Windows and Linux going head-to-head
operating systems

Windows vs Linux: what's the best operating system?

Can the open-source OS really stand up to Microsoft's enterprise juggernaut?
22 Jun 2022
Best free malware removal tools 2022
Malware spotted in red code on black background
Security

Best free malware removal tools 2022

Worried your device is infected? Here are the tools you need to get rid of malicious software
22 Jun 2022
GitHub makes Copilot generally available despite weak effectiveness
GitHub code on a dark background
Development

GitHub makes Copilot generally available despite weak effectiveness

The AI pair programmer and code-completer has passed a 12-month technical trial but most suggestions are ignored by developers
22 Jun 2022
Delivery firm Yodel disrupted by cyber attack
Delivery van with Yodel logo photographed through a shop door frame
cyber attacks

Delivery firm Yodel disrupted by cyber attack

The company confirmed that some services are down but deliveries are continuing, though specific details are currently unknown
21 Jun 2022
Security BSides commits to greater conference diversity after speaker backlash
A close up of a man stood at lectern speaking at business conference
cyber security

Security BSides commits to greater conference diversity after speaker backlash

A surprise booking of a divisive social engineer prompted a number of cyber security experts to pull out of BSides Cleveland
21 Jun 2022
Cloudflare fixes outage that knocked major web services offline
Cloudflare's headquarters in San Francisco
Network & Internet

Cloudflare fixes outage that knocked major web services offline

Online services such as Nord VPN, Shopify, and Steam were all inaccessible by users in most regions
21 Jun 2022
Cisco claims it's solved 'broken' hybrid work model
The Cisco logo hanging against fairy lights
Network & Internet

Cisco claims it's solved 'broken' hybrid work model

Networking giant flexes muscles at Las Vegas with slate of product launches as it insists recent troubles are in the rearview mirror - our Cisco Live …
20 Jun 2022
Microsoft reportedly blocks Russian Windows 10 and Windows 11 downloads
Windows 11 and Windows 11 displayed on two different laptops
Microsoft Windows

Microsoft reportedly blocks Russian Windows 10 and Windows 11 downloads

Local media report issues from inside Russia but the company has yet to confirm if it was a deliberate move or merely an error
20 Jun 2022
WAN Insights is Cisco’s first foray into predictive network intelligence
A sign with the word Cisco written in blue next to the word live! written in yellow, both of which are sat on a dark conference room floor
Network & Internet

WAN Insights is Cisco’s first foray into predictive network intelligence

The company has worked on the technology for years but WAN Insights is the first product that has been made available to businesses
16 Jun 2022
Cisco unveils new ‘intelligent’ approach to networking with brace of product launches
A white Cisco sign suspended from the ceiling of a dark conference room
Network & Internet

Cisco unveils new ‘intelligent’ approach to networking with brace of product launches

Cloud Management for Cisco Catalyst and Cisco Nexus both aim to bring deeper insights and ease the burden of IT teams
16 Jun 2022
Deepfake attacks expected to be next major threat to businesses
An abstract image showing two digital faces looking at each other
phishing

Deepfake attacks expected to be next major threat to businesses

Cisco’s cyber security experts agreed that social norms may also become “super weird” as a result
16 Jun 2022
Businesses need to be more aggressive with their cyber security, Cisco warns
Abstract image of a skull inside computer code
cyber security

Businesses need to be more aggressive with their cyber security, Cisco warns

Government warnings of Ukraine-Russia cyber war spillover must be heeded in order to stay safe
15 Jun 2022
Fairphone 4 Review: A modular phone for a wasteful world
Picture of the Fairphone 4
Hardware

Fairphone 4 Review: A modular phone for a wasteful world

Gallery with all images for IT Pro's review of the Fairphone 4
10 Jun 2022
Palermo ransomware attack: Vice Society claims responsibility as city details recovery strategy
Photograph taken of an old building in Palermo, Italy, with the sun setting in the background over the hills
ransomware

Palermo ransomware attack: Vice Society claims responsibility as city details recovery strategy

The Italian municipality is attempting to defy attackers by restoring its systems from backups
10 Jun 2022
Cisco must prevent its blip from becoming a full-blown crisis
Somebody holding a smartphone in front of a Cisco logo
Network & Internet

Cisco must prevent its blip from becoming a full-blown crisis

Supply chain woes have hampered the networking giant’s recent fortunes, but Cisco Live 2022 gives it the opportunity to prove doubters wrong
10 Jun 2022
Microsoft overhauls staff contracts, abandons 'non-compete clauses' to comply with state laws
A front view of Microsoft's office in Washington showing a glass front building and a small sign with the Microsoft logo
Business strategy

Microsoft overhauls staff contracts, abandons 'non-compete clauses' to comply with state laws

The tech giant will also no longer invoke non-disclosure agreements and will publish salary ranges on all job listings
9 Jun 2022
Kali Linux creators announce free cyber security sessions delivered live on Twitch
Code appearing on a screen while running pentesting processes to analyse a server
penetration testing

Kali Linux creators announce free cyber security sessions delivered live on Twitch

The brand-new initiative is aimed at reaching more aspiring certified pen-testers through twice-weekly livestreamed lessons
9 Jun 2022
Apple faces a catch-22 decision with iPhones and USB-C
iPhone with a USB-C cable rested on the screen, and an EU flag overlaid on the picture
Policy & legislation

Apple faces a catch-22 decision with iPhones and USB-C

The EU's decision to mandate USB-C across all electronics means Apple must either eat its words or anger its loyal customers once again
8 Jun 2022
Double extortion ransomware pushes average payments close to $1 million
A 2D mockup image of a business paying a cyber criminal for a ransom
ransomware

Double extortion ransomware pushes average payments close to $1 million

As the average payment approaches the landmark figure, experts reflect on times when the going rate was just $500
8 Jun 2022
Cyber criminals are spending longer inside business' networks after the initial breach
Digital generated image of electronic circuit security padlock made out of numbers on black background.
cyber attacks

Cyber criminals are spending longer inside business' networks after the initial breach

Cyber attackers' dwell time is up 36% thanks to initial access brokers and repeat exploitation of Microsoft Exchange vulnerabilities, according to Sop…
7 Jun 2022
Apple overhauls SwiftUI navigation and brings a score of new features to developers at WWDC 2022
Macbook, iPad, and iPhone all positioned in the frame showcasing Apple's new developer features
software development

Apple overhauls SwiftUI navigation and brings a score of new features to developers at WWDC 2022

Xcode also receives performance improvements and additional functionality, while Xcode Cloud is finally launched too
7 Jun 2022
Exploitation of Atlassian Confluence zero-day surges fifteen-fold in 24 hours
Atlassian logo on a smartphone, with the logo on a wall in the background too
zero-day exploit

Exploitation of Atlassian Confluence zero-day surges fifteen-fold in 24 hours

The zero-day code execution vulnerability was discovered last week and cyber attackers are already capitalising on the proof-of-concept code
6 Jun 2022
Fairphone 4 Review: A modular phone for a wasteful world
Top-down shot of Fairphone 4
Google Android

Fairphone 4 Review: A modular phone for a wasteful world

The latest Fairphone is still the statement fashion piece to show your eco-friendliness, but better performance can be found elsewhere for a cheaper p…
6 Jun 2022
State-sponsored hackers delay new Microsoft Exchange Server by four years
Laptop computer displaying logo of Microsoft Exchange
mail servers

State-sponsored hackers delay new Microsoft Exchange Server by four years

Hafnium's devastating zero-day exploit chain in 2021 forced Microsoft to improve the security of current versions instead of releasing the new one on …
6 Jun 2022
GitHub Enterprise Server 3.5 is equipped with a horde of new security protections
GitHub logo displayed on a smartphone in front of a mocked-up binary code background
software development

GitHub Enterprise Server 3.5 is equipped with a horde of new security protections

Admins are also given more controls to ensure the smooth running of servers, be it on-prem or in the cloud
1 Jun 2022
Chinese hackers exploit Microsoft zero-day as list of vulnerable Office products grows
Microsoft Office 365 image, with a magnifying glass over Microsoft Word
zero-day exploit

Chinese hackers exploit Microsoft zero-day as list of vulnerable Office products grows

Microsoft has published a support guide and temporary workarounds for IT admins to mitigate the threat
1 Jun 2022
How to turn on Windows Defender
Windows Defender notification on a screen
Software

How to turn on Windows Defender

Find out how to switch on Windows Defender in Windows 10 and older versions of the OS
31 May 2022
Russian Killnet cyber attacks begin on Italian-linked businesses
Russian hacking on a laptop mockup with code sprawling over the screen
cyber warfare

Russian Killnet cyber attacks begin on Italian-linked businesses

Italy's cyber security authority issued a warning to all public and private sector organisations with links to the country to prepare for an increased…
31 May 2022
Fresh Microsoft Office zero-day executes code on fully patched applications
A magnifying glass hovering over a PC screen with the symbols for Microsoft Office software displayed
zero-day exploit

Fresh Microsoft Office zero-day executes code on fully patched applications

Malicious documents saved in Rich Text Format are especially concerning since they can execute code without even being opened
30 May 2022
What is Azure Database for PostgreSQL?
Abstract image of stacked white discs on a green background to symbolise a database
databases

What is Azure Database for PostgreSQL?

We look at Microsoft's cloud implementation of the open source database
27 May 2022
What is hacktivism?
Two masked members of Anonymous demonstrating during the Occupy protest on October 15, 2011 in The Hague
hacking

What is hacktivism?

From Anonymous to Omega, here’s everything you need to know about hackers with a conscience
27 May 2022
KPMG to double its technical staff as it invests heavily in enterprise digital transformation
A photo of a grey building with the KPMG logo displayed on the side
business software

KPMG to double its technical staff as it invests heavily in enterprise digital transformation

The vastly expanded team will be tasked with building out the new suite of tools available in KPMG Products
27 May 2022