
Connor Jones is a Staff Writer at IT Pro covering cyber security, software development, and AI/ML. He’s a full-purpose journalist who reports breaking news, in-depth feature writing, hardware reviews, and multimedia journalism while dabbling in software development in his free time.
Proudly trained at the University of Sheffield's UK-leading journalism department, he holds a master’s degree in Magazine Journalism and a bachelor’s degree in English Language from Sheffield Hallam University.
Connor first joined IT Pro in 2018 as a graduate and returned in 2021 following a brief spell in PR. He got his first break in journalism after being scouted by Red Bull Esports for the role of contributing Counter-Strike Expert and has gone on to write for a range of top publications including UNILAD Tech.
You can reach Connor at connor.jones@futurenet.com or on Twitter at @ConnorLBJones

The top programming languages you need to learn for 2022

Salaries for the least popular programming languages surge as much as 44%

'Embrace PowerShell for better security', say UK, US, NZ cyber authorities

Making the most of Disk Management on Windows 10

Windows vs Linux: what's the best operating system?

Best free malware removal tools 2022

GitHub makes Copilot generally available despite weak effectiveness

Delivery firm Yodel disrupted by cyber attack

Security BSides commits to greater conference diversity after speaker backlash

Cloudflare fixes outage that knocked major web services offline

Cisco claims it's solved 'broken' hybrid work model

Microsoft reportedly blocks Russian Windows 10 and Windows 11 downloads

WAN Insights is Cisco’s first foray into predictive network intelligence

Cisco unveils new ‘intelligent’ approach to networking with brace of product launches

Deepfake attacks expected to be next major threat to businesses

Businesses need to be more aggressive with their cyber security, Cisco warns

Fairphone 4 Review: A modular phone for a wasteful world

Palermo ransomware attack: Vice Society claims responsibility as city details recovery strategy

Cisco must prevent its blip from becoming a full-blown crisis

Microsoft overhauls staff contracts, abandons 'non-compete clauses' to comply with state laws

Kali Linux creators announce free cyber security sessions delivered live on Twitch

Apple faces a catch-22 decision with iPhones and USB-C

Double extortion ransomware pushes average payments close to $1 million

Cyber criminals are spending longer inside business' networks after the initial breach

Apple overhauls SwiftUI navigation and brings a score of new features to developers at WWDC 2022

Exploitation of Atlassian Confluence zero-day surges fifteen-fold in 24 hours

Fairphone 4 Review: A modular phone for a wasteful world

State-sponsored hackers delay new Microsoft Exchange Server by four years

GitHub Enterprise Server 3.5 is equipped with a horde of new security protections

Chinese hackers exploit Microsoft zero-day as list of vulnerable Office products grows

How to turn on Windows Defender

Russian Killnet cyber attacks begin on Italian-linked businesses

Fresh Microsoft Office zero-day executes code on fully patched applications

What is Azure Database for PostgreSQL?

What is hacktivism?
