Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

John E Dunn

Biography

John is one of the co-founders of Techworld, following a spell working for Tornado Insider, the European magazine for tech start-ups. He started in IT journalism as technical editor of Personal Computer Magazine, before progressing to become editor of Network World (formerly LAN Magazine) and Network Week before helping to set up Techworld Insider. He has also freelanced for a number of technical publications in the technology, science and business fields.

His Techworld blog is War on Error


RSS Subscribe to John E Dunn's RSS Feed

Email Contact John E Dunn

Email John E Dunn on Twitter

Email John E Dunn on LinkedIn


All articles by John E Dunn

FBI blames North Korea for Sony hack citing malware evidence

The security establishment remains defiantly sceptical but a new statement form the FBI has formally pinned the blame for the Sony Pictures atttack on hackers acting on behalf of North Korea.

read more...

Dangerous 'Misfortune Cookie' flaw discovered in 12 million home routers

Researchers at Check Point have discovered a serious security vulnerability affecting at least 12 million leading-brand home and SME routers that appears to have gone unnoticed for over a decade.

read more...

Did North Korea set out to destroy Sony? The FBI is ready to blame Pyongyang

On January 20, 2010, then US Secretary of State Hillary Clinton launched the modern era of cyber geo-politics by publically blaming China for the Aurora attacks on Google and other companies in a Washington speech that broke every diplomatic convention ever written down.

read more...

TorrentLocker ransom rampage encrypts 285 million files and counting

Slovakian security wizards ESET have delved deep into the guts of the TorrentLocker ransom malware and pulled out some interesting details of its destructive life story starting with the number of files it has encrypted – a misery-inducing 285 million to date.

read more...

Is Iran is the new China? FBI warning suggests it's not far off

The FBI has sent a formal warning to US energy, defence and education organisations to be on the lookout for targeted Iranian cyberattacks, Reuters has reported.

read more...

Ransomware criminals turn to virus technique to spread infection

The criminals responsible for a recently-discovered piece of ransomware called VirRansom have raided the dirty tricks locker and pulled out a technique experts assumed was extinct – old-fashioned virus-like replication.

read more...

UK's biggest firms still falling down on anti-phishing security

Leading UK firms are still failing to implement basic layers of email security to protect themselves from brand abuse and their customers from phishing attacks, email vendor Agari has reported in its latest Q3 ranking.

read more...

Tripwire bought by old-world cabling firm for $710 million

Not long ago security firm Tripwire was on the hunt for acquisitions. This week it was on the receiving end as ancient cable equipment maker Belden splashed $710 million (£500 million) in cash to buy the firm.

read more...

Android 'DeathRing' malware being pre-loaded on cheap smartphones

For the second time in a year, Chinese-made Android smartphones have been discovered pre-flashed with malware, this time a Trojan security firm Lookout Mobile has ominously dubbed ‘DeathRing’.

read more...

Bluetooth 4.2's IPv6 connection a shot in the arm for Internet of Things

Hopes that an Internet of Things (IoT) based on IPv6 might soon become a reality has been given a boost by the news that features friendly to this vision of universal, low-power connectivity have just been added to the next version of Bluetooth.

read more...

If North Korea attacked Sony the US Government will be forced to act

If North Korea was behind the extraordinary cyberattack on Sony Pictures could this be the first confirmed example of an individual business being singled out for a crippling cyberattack by an entire country?

read more...

Were FIN4 insider-trading hackers helped by rogue investment bankers?

In a development that will deeply alarm regulators and anyone investing in shares, security firm FireEye has revealed details of a hacking group that has launched targeted 'insider trading' attacks against senior executives in public firms and their advisors.

read more...

Interpol crackdown as 118 people arrested at airports for plane ticket fraud

A global police crackdown co-ordinated by Interpol has seen the arrest of 118 people accused of using stolen or fake debit and credit cards to buy airplane tickets.

read more...

Syrian Electronic Army hits numerous media sites with DNS redirection attack

Pro-Assad nuisance-makers The Syrian Electronic Army (SEA) have returned from their slumber to pull of another DNS-level hack on possibly hundreds of websites including The London Evening Standard, The Independent, The Chicago Tribune, CNBC, The Daily Telegraph, Forbes and even PC World and the US National Hockey League.

read more...

Cheap Android tablets riddled with security flaws, test finds

Cheap clone Android tablets of the sort that crowd the shelves of many bricks-and-mortar US stores are often riddled with dangerous but hidden security flaws, a test by Bluebox Security has found.

read more...

BitDefender shows off 'Box', a home security device for the Internet of Things

Security firm BitDefender has announced a new type of home Intrusion Prevention System (IPS) device designed to make up for the inadequacies complement the capabilities of security software built into broadband routers.

read more...

So what if the Regin malware is British - this is just old-fashioned spying, right?

Is Regin the first example of a British cyberspying platform? Documented this week in some detail by Kaspersky Lab and to a lesser extent by Symantec, some experts privately think so even if getting them to say as much is proving difficult. In an area of software built on quicksand, nobody wants to sound too sure for fear of sounding foolish later on.

read more...

Creepy 'Regin' spy cyberweapon reminds researchers of Stuxnet

Symantec and Kaspersky Lab have discovered another cyber-surveillance tool of the sort countries use to spy on each other. Called ‘Regin’ by Symantec, it’s attracting a lot of attention because it is reminiscent of complex tools such as Duqu and Struxnet.

read more...

DDoS attacks swamping media and entertainment firms, Verisign reports

The trend for DDoS attacks to target media, entertainment and online gaming services shows no sign of abating with these sectors now accounting for more than half of all incidents, according the latest figures from Verisign’s protection services wing.

read more...

Ransom malware attacks underscore limitations of anti-virus software

CryptoLocker, CryptoWall, CryptoDefense, Dirty Decrypt, Critroni, CTB Locker, TorrentLocker, Cryptographic Locker. The first and most famous of those, CryptoLocker, might be gone but still the an army of clones keep coming, getting ever more sophisticated, targeting more file types and storage shares.

read more...

Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map