Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

John E Dunn


John is one of the co-founders of Techworld, following a spell working for Tornado Insider, the European magazine for tech start-ups. He started in IT journalism as technical editor of Personal Computer Magazine, before progressing to become editor of Network World (formerly LAN Magazine) and Network Week before helping to set up Techworld Insider. He has also freelanced for a number of technical publications in the technology, science and business fields.

His Techworld blog is War on Error

RSS Subscribe to John E Dunn's RSS Feed

Email Contact John E Dunn

Email John E Dunn on Twitter

Email John E Dunn on LinkedIn

All articles by John E Dunn

US retailers still struggling with data breach security, says BitSight

US retailers are still struggling to improve their defences against data breaches, with almost two thirds experiencing declining security performance using a methodology based on looking for traces of malware and compromise, security benchmarking vendor BitSight has reported.


Data breaches rose 25 percent to 320 incidents in single quarter, SafeNet figures find

SafeNet’s latest Breach Level Index (BLI) report has underlined the bleak picture of global data breaches, with 320 reported compromises between July and September leaking a total 183 million customer records.


Android and iOS apps still being cloned to spread malware

Mobile app cloning from unauthorised app sites now affects 97 percent of the top 100 paid Android apps and 87 percent of the Apple iOS apps in the same category, with financial services, healthcare and retail popular targets for criminals, Arxan Technology’s annual survey of the phenomenon has found.


China's 'knock-off' J-31 fighter - cyberwar spoils or an an example of its self-deception?

The Chinese Government has been accused of numerous military-industrial cyber-attacks against the US, the direct effects of which are almost impossible to gauge. The troubled case of China’s J-31 'Shenyang' stealth fighter, formally unveiled at the Zhuhai Air Show last week, might turn out to be a fascinating exception to this rule.


Samsung's Knox to be tightly integrated with BlackBerry's BES12

Under-pressure BlackBerry is fighting back, announcing a tie-up with Samsung that will bring the firm’s BlackBerry Enterprise Service 12 (BES 12) security to Android handsets running the South Korean vendor’s Knox containerisation system.


'Malvertising' research blog pulled after ad network objects to methodology

Earlier this week security startup Lastline pulled a blog outlining malvertising research it did into the ‘Top 10 dirtiest ad networks’ after one or more of those mentioned objected to the firm’s methodology.


Coca Cola sued by former employee over unencrypted laptop data theft

Coca Cola is facing a potential class-action lawsuit after one of the people whose personal data was on one of a clutch of laptops stolen from the company says he suffered identity theft as a result of the breach.


Is this app the answer to account hijacking? LogDog launches on Google Play

Orange-backed Israeli startup LogDog has launched a new smartphone app it believes offers a way for users of services such as Gmail and Twitter to secure these accounts against hijacking by monitoring for unauthorised access.


Google warns of deadly manual account hijacking attacks

If an attacker compromises an online account what damage can they do and how does the user wrest back control?


US Government hit by 46,000 data breaches in 2013, research finds

The number of data breaches suffered by US Government networks reached more than 46,000 in 2013, many of them caused by the incompetence or mistakes of workers, a Freedom of Information survey by the Associated Press has discovered.


Darkhotel APT hackers campaign 'followed' global CEOs using hotel networks

A state-backed espionage group has spent years targeting senior executives from large global companies using a specialised Advanced Persistent Threat (APT) that can follow and steal data from them as they move around the globe from hotel to hotel, Kaspersky has revealed.


Raspberry Pi Model A+ cuts size, power and price to only $20

The Raspberry Pi project has squeezed a bit more juice out of the world’s greatest educational and hobbyist computing platform, producing a new Model A+ that shadows improvements made in the Model B+ announced in July.


Spread of Internet encryption creating 'visibility void' claims Blue Coat

Large numbers of websites and Internet services are disappearing behind encrypted connections, part of a growing “visibility void” in which organisations struggle to tell friendly traffic from foe, security firm Blue Coat has argued.


ICO issues warning over SQL injection flaws as travel firm fined £7,500

The UK Information Commissioner's Office (ICO) has warned organisations to wise up on SQL injection flaws after fining a travel firm for a serious data breach caused by the issue.


Rovnix Trojan has infected 130,000 UK Windows PCs, warns BitDefender

A new version of the The Rovnix Trojan that has spent 2014 quietly spreading across the Internet has infected at least 130,000 PCs in the UK to pilfer credit card data, security firm BitDefender has warned.


Facebook users still being suckered by common scams, says BitDefender

There have never been more warnings about Facebook scams and social engineering attacks and yet millions of its users are falling for them in seemingly ever-greater numbers. Why?


Avecto's new Defendpoint client has another go at application sandboxing

Is UK security firm Avecto about to make application sandboxing usable at last?


Firewall admins turning off security to boost performance - bad move

A third of organisations are turning off some of their next-generation firewall’s (NGFW) security features to boost performance with the most commonly deactivated layer being intrusion prevention, a McAfee survey has discovered.


iStorage DatAshur Personal encrypted USB stick

The iStorage DatAshur Personal is an encrypted USB stick whose unique selling point is that the user gains access to the data stored on it by entering a PIN of between seven and fifteen digits.


Anti-virus is no longer enough - new apps show how vulnerability scanning is becoming a must

It has taken a long time, but slowly and surely computer security has reached the moment where it moves away from simply securing a device from specific threats to one in which more attention is paid to its everyday security state.


Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map