Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

John E Dunn

Biography

John is one of the co-founders of Techworld, following a spell working for Tornado Insider, the European magazine for tech start-ups. He started in IT journalism as technical editor of Personal Computer Magazine, before progressing to become editor of Network World (formerly LAN Magazine) and Network Week before helping to set up Techworld Insider. He has also freelanced for a number of technical publications in the technology, science and business fields.

His Techworld blog is War on Error


RSS Subscribe to John E Dunn's RSS Feed

Email Contact John E Dunn

Email John E Dunn on Twitter

Email John E Dunn on LinkedIn


All articles by John E Dunn

Symantec and Kaspersky Lab antivirus software kicked off Chinese Government approved list

Symantec and Kaspersky Lab have become the latest tech firms to be kicked off the Chinese Government’s approved list, according to an unconfirmed report in the country’s media.

read more...

CryptoWall ransom attacks net huge haul of Bitcoins from victims

The criminal gang behind the CryptoWall extortion malware has recently raked in a haul of Bitcoins worth hundreds of thousands of dollars from its unknown victims, security firm PhishMe has revealed.

read more...

Paddy Power condemned after waiting FOUR YEARS to tell 650,000 customers of data breach

Popular gambling site Paddy Power has been heavily criticised after taking an incredible four years to tell 650,000 customers that their personal data has been compromised in a data breach dating back to 2010.

read more...

PCI regime has bred complacent tick-box security among retailers, Tripwire survey finds

Retail and financial services organisations have become over-reliant on high-level compliance regimes such as PCI DSS to shore up their networks against data breaches, a survey of 400 UK and US organisations by security firm Tripwire has suggested.

read more...

Tor points finger at US researchers after possible compromise of service

In a year, Tor has turned from a celebrated global anonymity service into a full-scale privacy battleground, under attack from suspicious Feds, abused by criminals while earlier this week we learned that even the Russian Government hates it.

read more...

Police warnings to appear on websites suspected of copyright abuse

UK visitors to websites suspected of pirating content will from this week be served banners warning them of the site’s suspect status, the Police Intellectual Property Crime Unit (PIPCU) has announced.

read more...

Defunct Koler ransom Trojan attacked 200,000 Android users in matter of weeks

The crude Koler.a ‘police ransom’ Trojan that started attacking Android smartphone users in April has finally been knocked out of action by researchers but only after revealing the disturbing if brief scale of its global success.

read more...

Is the WEDG the answer to post-Snowden data paranoia? Its inventor remains hopeful

The British entrepreneur behind the innovative WEDG secure storage box for the ‘post-Snowden era’ has told Techworld he remains upbeat about its chances despite still being some way short of the £90,000 ($150,000) set for the project on Kickstarter.

read more...

Mystery 'Onion/Critroni' ransom Trojan evolves to use more sophisticated encryption

Kaspersky Lab has added more detail on the fiendish ‘Onion’ (aka 'Critroni') ransom Trojan that uses the Tor anonymity service to hide its command and control (C&C) as well as displaying a level of thoughtfulness about its encryption design that bodes ill for future attacks.

read more...

Nigerian 419 scammers diversifying into Trojan malware, finds Palo Alto

A Nigerian cybercrime gang versed in 419 social engineering scams has diversified into using off-the-shelf RAT tools to attacks Taiwanese and South Korean businesses, according to researchers working for Palo Alto Networks.

read more...

Internet Explorer vulnerabilities surge to record levels in 2014, NVD figures reveal

Microsoft’s Internet Explorer experienced a record number of software vulnerabilities in the first half of 2014, far above any other popular program, a Bromium analysis of US National Vulnerability Database (NVD) figures has shown.

read more...

Third of UK IT professionals would completely overhaul network security if they could, Websense finds

With complex threats lapping over networks wouldn’t security be improved by simply starting afresh? Fanciful perhaps but a third of experienced UK-based IT staff in a new Websense survey said they’d consider at least a “complete overhaul” if resources made it possible.

read more...

Russian cyberweapons cross-pollinating commercial malware, analysis claims

Sophisticated code of the sort used in Russian Government cyberweapons could be seeping into the commercial malware wielded by the country's criminals, a security firm has suggested after analysing the apparent cross-pollination in a previously unknown piece of malware called ‘Gyges’.

read more...

CryptoWall ransom malware struck US brokerage Benjamin F. Edwards & Co

US brokerage Benjamin F. Edwards & Co has admitted that it could have suffered a data breach earlier this year after an employee at the firm became infected with the CryptoWall ransom malware, it has emerged.

read more...

Phishing gang stole money from Apple users to fund UK criminal network

A man and a woman have been handed a total of 14 years in jail for a phishing scam the proceeds of which were used to buy air tickets for Romanian criminals wanting to travel to the UK.

read more...

Facebook users still an irresistible target for phishing attackers, says Kaspersky

Phishing attacks from inside Facebook have fallen back from the historic peak of 2013 but still constitute 1 in 10 of all attacks of this type blocked by Kaspersky’s security software, the firm has reported.

read more...

Google's Project Zero flaw programme - do-gooding spin or a much-needed evolution?

read more...

Wave of 100Gbps 'mega' DDoS attacks hits record level in 2014

Huge DDoS attacks are becoming a regular occurrence with over 100 incidents breaching the psychological 100Gbps barrier that used to be seen as signifying trouble, new figures from Arbor Networks have confirmed.

read more...

Panda Security's new CEO plots reboot 2.0 for resurgent security brand

Panda Security is the plucky Spanish antivirus firm that stormed the international market nearly a decade ago as malware threats boomed, beating most of its rivals to the idea of cloud security as an alternative to signature scanning. Well regarded technically and apparently successful, around 2010 the firm suddenly hit a sales wall.

read more...

Android apps ask for too many intrusive permissions, Zscaler analysis finds

In the economy of mobile apps, you are less a consumer of software than consumed by it. That's according to security firm Zscaler that has analysed the surprisingly intrusive permissions demanded by many popular Google App store apps before they will allow a download to start.

read more...

Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map