IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more
Rene Millman

Rene Millman is a freelance writer and broadcaster who covers cybersecurity, AI, IoT, and the cloud. He also works as a contributing analyst at GigaOm and has previously worked as an analyst for Gartner covering the infrastructure market. He has made numerous television appearances to give his views and expertise on technology trends and companies that affect and shape our lives. You can follow Rene Millman on Twitter.

17 Windows 10 problems - and how to fix them
Windows 10 error message displayed on a monitor
operating systems

17 Windows 10 problems - and how to fix them

Tips and tricks for everything from upgrade issues and freeing up storage, to solving privacy errors and using safe mode
20 May 2022
How to factory reset Windows 10
The Cortona screen on Windows 10
operating systems

How to factory reset Windows 10

If your Windows 10 system isn't playing ball, you can reset it back to its factory conditions
13 May 2022
Reimagining Edinburgh with cutting-edge smart city projects
Landscape photo of the city of Edinburgh at dusk
smart city

Reimagining Edinburgh with cutting-edge smart city projects

With several exciting projects underway, what will Scotland’s capital city look like in five years’ time?
14 Apr 2022
How to rotate a laptop or PC screen
A display in portrait mode
operating systems

How to rotate a laptop or PC screen

Portrait or landscape; how do you get a new perspective on your screen?
8 Apr 2022
How to use Chromecast without Wi-Fi
A Google Chromecast device hanging from a USB port on a TV
Mobile

How to use Chromecast without Wi-Fi

Google’s streaming stick is a great travelling companion, but how can you use Chromecast without Wi-Fi?
5 Apr 2022
The 14 most in-demand tech jobs
A woman holding a laptop sat outside an office building during the day
Careers & training

The 14 most in-demand tech jobs

Looking to future proof your career? These are the roles that are likely to stay relevant for many years to come
4 Apr 2022
The most secure email services of 2022
Secure inbox depicted with code
email providers

The most secure email services of 2022

Email is not secure by design, but these email providers allow you to send emails with top-level security
25 Mar 2022
Optimising the management of hybrid cloud
Somebody motioning to push a button with a cloud symbol
Cloud

Optimising the management of hybrid cloud

Having the right foundations in place can make an organisation’s hybrid cloud infrastructure work much better
23 Mar 2022
The five most secure smartphones
iPhone 12 Pro Max phone on a table with the three camera lenses facing up
Mobile Phones

The five most secure smartphones

These secure smartphones ensure your data and privacy are protected
11 Mar 2022
The best SQL courses of 2022
Rows of SQL code on a computer screen
SQL

The best SQL courses of 2022

Managing and organizing data in business means you need to know SQL, but which course is best?
11 Mar 2022
VMware vSphere vs Proxmox: Which is best for your business?
Graphical depiction of virtualisation with bright lights emerging from servers
virtualisation

VMware vSphere vs Proxmox: Which is best for your business?

Choosing a virtualisation tool can be tricky, so we've pitted two of the most popular head-to-head
25 Feb 2022
What is HTTP error 503 and how do you fix it?
A graphic showing the HTTPS symbol
web browser

What is HTTP error 503 and how do you fix it?

It may not always be obvious what's causing the issue, but there are steps you can take to get back online
11 Feb 2022
What is a 502 bad gateway and how do you fix it?
502 error spelt out in wooden blocks on a grey background
web hosting

What is a 502 bad gateway and how do you fix it?

We explain what this networking error means for users and website owners
11 Feb 2022
How to build a zero trust model
Cyber security represented by a digital screen with encryption data background
Security

How to build a zero trust model

Threats are becoming greater and more diverse, but having a zero trust architecture could help your business defend its infrastructure
11 Jan 2022
Five things to consider before choosing an MFA solution
Image of two-factor authentication in action
Security

Five things to consider before choosing an MFA solution

Because we all should move on from using “password” as a password!
17 Dec 2021
CTO job description: What does a CTO do?
CTO plaque on desk with office chair
Business strategy

CTO job description: What does a CTO do?

More than a glorified IT manager, a CTO can have real clout in an organisation
6 Dec 2021
Could using blockchain kill your green credentials?
Blocks organised in several lines to represent blockchain technology
blockchain

Could using blockchain kill your green credentials?

With Bitcoin transactions consuming enough energy to fuel a small country, can blockchain technology ever be considered environmentally friendly?
1 Dec 2021
More than 90% of IT decision makers reuse passwords
Laptop screen with a man entering a password
Security

More than 90% of IT decision makers reuse passwords

Bitwarden survey also finds that half of IT professionals share their passwords with colleagues
30 Nov 2021
Over 300,000 Android users downloaded banking trojan malware
Trojan virus within binary code
hacking

Over 300,000 Android users downloaded banking trojan malware

Hackers defeated Google Play restrictions by using smaller droppers in apps and eliminating permissions needed
30 Nov 2021
Chinotto spyware spies on North Korean defectors and activists
Computer code on a screen with a skull representing a computer virus / malware attack.
spyware

Chinotto spyware spies on North Korean defectors and activists

Long term operation by ScarCruft hackers has been linked to the North Korean government
30 Nov 2021
Sabbath hackers are targeting US schools and hospitals
Visual representation of ransomware by showing encrypted files on a display
ransomware

Sabbath hackers are targeting US schools and hospitals

The rebranded hacking group is demanding multi-million-dollar ransom payments, according to Mandiant
29 Nov 2021
CronRat Magecart malware uses 31st February date to remain undetected
Cronrat strikes Linux
malware

CronRat Magecart malware uses 31st February date to remain undetected

The malware allows for server-side payment skimming that bypasses browser security
26 Nov 2021
Best C++ courses to kickstart your career
A man with glasses looking at several screens with code on them
software development

Best C++ courses to kickstart your career

If you want to learn C++ for a new job, these are the courses you should consider
26 Nov 2021
Flaw in Android phones could let attackers eavesdrop on calls
A red Android mascot
Google Android

Flaw in Android phones could let attackers eavesdrop on calls

The vulnerable chips are thought to be present in 37% of all smartphones worldwide
26 Nov 2021
Education and government most at risk from email threats
Abstract image of a fishing hook through a red email to represent a phishing attack
phishing

Education and government most at risk from email threats

New report finds phishing remains most dominant threat to IT security
26 Nov 2021
Vodafone to roll out self-sufficient masts powered entirely by renewable energy
The top of a new bird-friendly wind turbine developed by Crossflow
mobile networks

Vodafone to roll out self-sufficient masts powered entirely by renewable energy

Masts will be built in remote locations in the UK following a trial later this year
25 Nov 2021
Microsoft patch fails to fix Installer zero-day affecting every version of Windows
Red lock unlocked among several blue locked locks
zero-day exploit

Microsoft patch fails to fix Installer zero-day affecting every version of Windows

The exploit allows hackers to elevate privileges and create admin accounts
25 Nov 2021
Samsung selects Texas for $17 billion semiconductor factory
A view of Samsung's semiconductor plant in Austin
components

Samsung selects Texas for $17 billion semiconductor factory

New plant to be built in Taylor, just 25km away from Samsung's existing site in Austin
25 Nov 2021
UK gov introduces cyber bill designed to clamp down on unsecure devices
A hacker wearing black gloves using a laptop keyboard
IT regulation

UK gov introduces cyber bill designed to clamp down on unsecure devices

Law could prevent sale of smartphones, TVs, speakers, toys, and other digital devices that fail to meet minimum security requirements
24 Nov 2021
Vast majority of US healthcare web apps vulnerable to attack
A heartbeat monitor displayed inside an operating room
network security

Vast majority of US healthcare web apps vulnerable to attack

Report suggests patient data is at risk from poor security hygiene
24 Nov 2021
Investors warned to be vigilant of fake SEC alerts
The website of the US Securities and Exchange Commission displayed on a web browser
cyber crime

Investors warned to be vigilant of fake SEC alerts

Hackers are targeting victims using phone calls and voice mails about cryptocurrency transactions
22 Nov 2021
Hackers use SquirrelWaffle malware to hack Exchange servers in new campaign
Microsoft Exchange logo displayed on a laptop
malware

Hackers use SquirrelWaffle malware to hack Exchange servers in new campaign

Researchers discovered malicious emails being sent as replies to existing email chains
22 Nov 2021
Sky Broadband took almost 18 months to fix serious router flaw
Sky router flaw
vulnerability

Sky Broadband took almost 18 months to fix serious router flaw

Flaw could expose user’s home network to hackers
19 Nov 2021
Hackers use Linux backdoor on compromised e-commerce sites with software skimmer
Small shopping cart on a keyboard
malware

Hackers use Linux backdoor on compromised e-commerce sites with software skimmer

Cyber criminals in China control the malware
19 Nov 2021
Iranian hackers ramp up attacks against IT services sector
The flag of Iran depicted in programming code
hacking

Iranian hackers ramp up attacks against IT services sector

Microsoft security researchers warn hacking is part of broader cyber espionage effort
19 Nov 2021
TikTok phishing campaign tried to scam over 125 influencer accounts
The TikTok logo on an application store accessed from a smartphone
social media

TikTok phishing campaign tried to scam over 125 influencer accounts

Hackers threatened to delete accounts over copyright violations
18 Nov 2021