Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

John E. Dunn


John is one of the co-founders of Techworld, following a spell working for Tornado Insider, the European magazine for tech start-ups. He started in IT journalism as technical editor of Personal Computer Magazine, before progressing to become editor of Network World (formerly LAN Magazine) and Network Week before helping to set up Techworld Insider. He has also freelanced for a number of technical publications in the technology, science and business fields.

His Techworld blog is War on Error

RSS Subscribe to John E. Dunn's RSS Feed

Email Contact John E. Dunn

Email John E. Dunn on Twitter

Email John E. Dunn on LinkedIn

All articles by John E. Dunn

Palo Alto next-gen firewall marked a 'caution' in NSS Labs test

Do independent security tests make or break products? Normally not but the latest assessment of next-generation firewalls (NGFWs) by testing firm NSS Labs will make mixed reading for some of the products with one – Palo Alto’s PA-3020 – described as “below average” with a rating of “caution”.


Cheryl Cole crowned 'most dangerous' UK malware lure of 2014

Cheryl Cole of the hit TV show X Factor is now the most ‘dangerous’ celebrity UK Internet users can punch into a search engine, according to McAfee’s SiteAdvisor security filter.


PwC reports finds security spending is falling – isnt this what security vendors promised?

Nothing gets a rise out of security vendors like a good story about under-investment and spending cuts by the very enterprises that a hundred headlines a week tell us are being plundered by cyber-criminals at will.


UK security startup WEDG hits £71,000 Indiegogo target in days

Only weeks after failing to reach its funding target on Kickstarter, UK security startup WEDG has walked home with the £71,000 ($116,000) it asked for on smaller rival Indiegogo, its founders have announced.


FBI opens malware tool to public as part of radical crowdsourcing plan

The FBI is close to allowing anonymous outsiders to use its Malware Investigator tool for the first time through a dedicated crowdsourcing portal, an official reportedly confirmed at last week’s Virus Bulletin conference.


Internet criminals migrating to hide inside 'darknets' warns Europol

As if tackling the malware economy wasn’t already hard enough, police forces face a massive task keeping tabs on the ‘darknet’ of anonymisation services that are being used by criminals to hide themselves, Europol’s latest Internet Organised Crime Assessment (iOCTA) has argued.


SAM 'electronic lego for kids' project storms Kickstarter on day one

It’s called ‘SAM’, it launched on Kickstarter today, and its makers believe they’ve cracked one of the most difficult problems in educational computing – how to teach young minds the secrets of getting electronic devices and computer code to work together.


BYOD firms remotely wipe 130,000 mobile devices every year, finds Fiberlink

Remotely wiping mobile devices is proving to be a hugely popular feature for enterprises and IBM’s Fiberlink division has some numbers to prove it. The firm's figures show that an average of 450 mobile devices are now being wiped every day by users of its MaaS360 cloud platform.


National Crime Agency to feed UK banks real-time cyber-alerts

Britain’s banks are to start using a new alerting system that will make it easier for a range of police and government agencies to warn its members of of cyberattacks and frauds in real time.


Bash 'shellshock' flaw is serious because fixing it will depend on manual intervention

Sometimes security makes you feel tired. Less than six months after Heartbleed, the security industry now has had the potentially even more serious Bash or ‘Shellshock’ CVE-2014-6271 flaw dumped in its lap. Exactly how serious is open to some interpretation but everyone seems to agree on one thing – this one won’t be easy to fix.


Chinese 'Spike' DDoS botnet targets Windows, Linux and IoT devices

Akamai’s Prolexic division has warned of the growing threat from a Chinese toolkit that has started infecting Linux, Windows and embedded systems in order to launch DDoS attacks peaking at hundreds of Gigabits per second.


Blackphone and Silent Circle offer $128 bounty for security flaws

The Bugcrowd-managed program covers the PrivatOS software that runs Blackphone’s Android fork plus all network and cloud services, most though not all website flaws and vulnerabilities detected on the Silent Circle suite of secure apps used by the handset.


Apple's iPhone 6 Touch ID has same fingerprint failings as 5s

The Touch ID fingerprint security that comes with Apple’s iPhone 6 is no better at resisting sophisticated print-lifting attacks than the iPhone 5s on which the system made its debut, according to a researcher from mobile security firm Lookout.


Security pro wins £10,000 prize after inventing better threat modelling system

An enterprising British security professional has won NCC Group’s £10,000 ($16,000) ‘Cyber 10K’ prize after proposing a security tool designed to overcome the problems that have held back application threat modelling among developers.


Android banking malware suspects arrested by Russian police

Police in Russia have reportedly arrested two cybcercriminals accused of being behind an Android malware campaign that lifted funds from bank accounts used to top up smartphones.


Researchers discover better way to automatically detect malicious websites

Researchers have built a proof-of concept security system that can accurately sift real websites from malicious ones by looking for only two simple giveaway ‘signals’ – content obfuscation and the use of bogus online certifications.


DDoS attackers turn fire on ISPs and gaming servers

DDoS attackers seem to have switched their attention from banks to gaming hosts, ISPs and even enterprises, half-year figures from Chinese mitigation vendor NSFOCUS have confirmed.


Cisco's 5500 series firewalls get major Sourcefire security overhaul

Forget the next-generation firewall story, Cisco is telling its customers that the next wave is something that goes far beyond mere application control by integrating intrusion protection and malware detection and control into one box.


Top US brands still falling foul of CAN-SPAM legislation, study finds

More than a decade on from the ground-breaking CAN-SPAM laws meant to stop the barrage of unwanted email pestering US consumers, one in ten firms still falls foul of its most basic provisions, according to a study by the non-profit Online Trust Alliance (OTA).


UK appoints first SME cyber-security 'czar' with £4 million funding boost

The UK Government has appointed Andy Williams from industry body TechUK as its first ever SME cyber-czar and pumped £4 million into a competition for small firms looking to develop new security technology.


Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map