Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

John E. Dunn

Biography

John is one of the co-founders of Techworld, following a spell working for Tornado Insider, the European magazine for tech start-ups. He started in IT journalism as technical editor of Personal Computer Magazine, before progressing to become editor of Network World (formerly LAN Magazine) and Network Week before helping to set up Techworld Insider. He has also freelanced for a number of technical publications in the technology, science and business fields.

His Techworld blog is War on Error


RSS Subscribe to John E. Dunn's RSS Feed

Email Contact John E. Dunn

Email John E. Dunn on Twitter

Email John E. Dunn on LinkedIn


All articles by John E. Dunn

Palo Alto next-gen firewall marked a 'caution' in NSS Labs test

Do independent security tests make or break products? Normally not but the latest assessment of next-generation firewalls (NGFWs) by testing firm NSS Labs will make mixed reading for some of the products with one – Palo Alto’s PA-3020 – described as “below average” with a rating of “caution”.

read more...

Cheryl Cole crowned 'most dangerous' UK malware lure of 2014

Cheryl Cole of the hit TV show X Factor is now the most ‘dangerous’ celebrity UK Internet users can punch into a search engine, according to McAfee’s SiteAdvisor security filter.

read more...

PwC reports finds security spending is falling – isnt this what security vendors promised?

Nothing gets a rise out of security vendors like a good story about under-investment and spending cuts by the very enterprises that a hundred headlines a week tell us are being plundered by cyber-criminals at will.

read more...

UK security startup WEDG hits £71,000 Indiegogo target in days

Only weeks after failing to reach its funding target on Kickstarter, UK security startup WEDG has walked home with the £71,000 ($116,000) it asked for on smaller rival Indiegogo, its founders have announced.

read more...

FBI opens malware tool to public as part of radical crowdsourcing plan

The FBI is close to allowing anonymous outsiders to use its Malware Investigator tool for the first time through a dedicated crowdsourcing portal, an official reportedly confirmed at last week’s Virus Bulletin conference.

read more...

Internet criminals migrating to hide inside 'darknets' warns Europol

As if tackling the malware economy wasn’t already hard enough, police forces face a massive task keeping tabs on the ‘darknet’ of anonymisation services that are being used by criminals to hide themselves, Europol’s latest Internet Organised Crime Assessment (iOCTA) has argued.

read more...

SAM 'electronic lego for kids' project storms Kickstarter on day one

It’s called ‘SAM’, it launched on Kickstarter today, and its makers believe they’ve cracked one of the most difficult problems in educational computing – how to teach young minds the secrets of getting electronic devices and computer code to work together.

read more...

BYOD firms remotely wipe 130,000 mobile devices every year, finds Fiberlink

Remotely wiping mobile devices is proving to be a hugely popular feature for enterprises and IBM’s Fiberlink division has some numbers to prove it. The firm's figures show that an average of 450 mobile devices are now being wiped every day by users of its MaaS360 cloud platform.

read more...

National Crime Agency to feed UK banks real-time cyber-alerts

Britain’s banks are to start using a new alerting system that will make it easier for a range of police and government agencies to warn its members of of cyberattacks and frauds in real time.

read more...

Bash 'shellshock' flaw is serious because fixing it will depend on manual intervention

Sometimes security makes you feel tired. Less than six months after Heartbleed, the security industry now has had the potentially even more serious Bash or ‘Shellshock’ CVE-2014-6271 flaw dumped in its lap. Exactly how serious is open to some interpretation but everyone seems to agree on one thing – this one won’t be easy to fix.

read more...

Chinese 'Spike' DDoS botnet targets Windows, Linux and IoT devices

Akamai’s Prolexic division has warned of the growing threat from a Chinese toolkit that has started infecting Linux, Windows and embedded systems in order to launch DDoS attacks peaking at hundreds of Gigabits per second.

read more...

Blackphone and Silent Circle offer $128 bounty for security flaws

The Bugcrowd-managed program covers the PrivatOS software that runs Blackphone’s Android fork plus all network and cloud services, most though not all website flaws and vulnerabilities detected on the Silent Circle suite of secure apps used by the handset.

read more...

Apple's iPhone 6 Touch ID has same fingerprint failings as 5s

The Touch ID fingerprint security that comes with Apple’s iPhone 6 is no better at resisting sophisticated print-lifting attacks than the iPhone 5s on which the system made its debut, according to a researcher from mobile security firm Lookout.

read more...

Security pro wins £10,000 prize after inventing better threat modelling system

An enterprising British security professional has won NCC Group’s £10,000 ($16,000) ‘Cyber 10K’ prize after proposing a security tool designed to overcome the problems that have held back application threat modelling among developers.

read more...

Android banking malware suspects arrested by Russian police

Police in Russia have reportedly arrested two cybcercriminals accused of being behind an Android malware campaign that lifted funds from bank accounts used to top up smartphones.

read more...

Researchers discover better way to automatically detect malicious websites

Researchers have built a proof-of concept security system that can accurately sift real websites from malicious ones by looking for only two simple giveaway ‘signals’ – content obfuscation and the use of bogus online certifications.

read more...

DDoS attackers turn fire on ISPs and gaming servers

DDoS attackers seem to have switched their attention from banks to gaming hosts, ISPs and even enterprises, half-year figures from Chinese mitigation vendor NSFOCUS have confirmed.

read more...

Cisco's 5500 series firewalls get major Sourcefire security overhaul

Forget the next-generation firewall story, Cisco is telling its customers that the next wave is something that goes far beyond mere application control by integrating intrusion protection and malware detection and control into one box.

read more...

Top US brands still falling foul of CAN-SPAM legislation, study finds

More than a decade on from the ground-breaking CAN-SPAM laws meant to stop the barrage of unwanted email pestering US consumers, one in ten firms still falls foul of its most basic provisions, according to a study by the non-profit Online Trust Alliance (OTA).

read more...

UK appoints first SME cyber-security 'czar' with £4 million funding boost

The UK Government has appointed Andy Williams from industry body TechUK as its first ever SME cyber-czar and pumped £4 million into a competition for small firms looking to develop new security technology.

read more...

Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map