Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

John E Dunn

Biography

John is one of the co-founders of Techworld, following a spell working for Tornado Insider, the European magazine for tech start-ups. He started in IT journalism as technical editor of Personal Computer Magazine, before progressing to become editor of Network World (formerly LAN Magazine) and Network Week before helping to set up Techworld Insider. He has also freelanced for a number of technical publications in the technology, science and business fields.

His Techworld blog is War on Error


RSS Subscribe to John E Dunn's RSS Feed

Email Contact John E Dunn

Email John E Dunn on Twitter

Email John E Dunn on LinkedIn


All articles by John E Dunn

Windows XP's vulnerability underscored by latest Patch Tuesday update

Microsoft’s latest Patch Tuesday features a raft of fixes for flaws in Windows XP, something that bodes ill for hold-out users determined to stick with the OS, experts have warned.

read more...

UK's top 100 online brands often allow lax password security, research finds

Two thirds of the UK’s top 100 e-retail brands use password security so rudimentary consumers are allowed to secure accounts using passwords as weak as ‘123456’ or ‘password’, an analysis has discovered.

read more...

Target hackers showed intimate knowledge of firm's network, suggests McAfee

The attack that planted malware on Target’s point of sale (POS) terminals in November’s huge data breach used inside knowledge of the network rather than a vulnerability in its retail software, McAfee has said in its latest quarterly analysis.

read more...

FireEye $460 million offering will fuel more hiring and M&A

With one of the fastest-rising head counts in Silicon Valley, security darling FireEye has announced a $457 million (£280 million) secondary offering to raise cash for even more hiring and future acquisitions.

read more...

Invisible Russian cyberweapon stalked US and Ukraine since 2005, new research reveals

The mysterious ‘Uroburos’ cyberweapon named last week in Germany has been stalking its victims since as far back as 2005 and large enterprises and governments need to pay urgent attention to the threat it poses, UK security firm BAE Systems has urged.

read more...

The greatest security story never told – how Microsoft's SDL saved Windows

Microsoft has launched a new website to “tell the untold story” of something it believes changed the history of Windows security and indeed Microsoft itself – the Security Development Lifecycle or plain ‘SDL’ for short.

read more...

Rogue ads overtake porn as top mobile malware attack method

Rogue adverts that use social engineering to persuade users to install malware have displaced porn as the leading method of attack on mobile devices, according to a report from security firm Blue Coat.

read more...

Tor network used to hide 900 botnets and darknet markets, says Kaspersky Lab

The Tor network is in danger of being swamped by criminals abusing its anonymity to hide an underworld of parasitic botnets, malicious command and control and ‘darknet’ markets, according to research from Kaspersky Lab.

read more...

Criminals hack 300,000 home routers as part of mystery 'pharming' attack

Criminals have quietly compromised 300,000 consumer and small office routers as part of a newly-discovered global DNS redirection campaign, independent US research outfit Team Cymru has discovered.

read more...

Samsung Chromebook 2 shows off 8-core ARM chip and $400 price tag

Samsung has announced the long-awaited Chromebook 2 and the full specification is a shock to the system. This Chromebook is a $400 8-core computer mid-range laptop.

read more...

Non-Microsoft security flaws cause biggest headache, says Secunia

Three quarters of Windows security vulnerabilities in 2013 were connected to non-Microsoft programs that often lack adequate patching mechanisms, an analysis by security firm Secunia has found.

read more...

Is this Russia's Stuxnet? Security firm spots suspicious 'Uroburos' rootkit

‘Uroburos’ is an advanced rootkit that has been infecting networks since as far back as 2011, quietly stealing data after setting up rogue P2P networks within its high-level targets.

read more...

Cryptolocker hit more UK victims than previously realised, researchers find

The Cryptolocker ransom Trojan has probably affected tens of thousands of UK Internet users with many victims choosing to pay the fraudsters, the first independent study of the issue by researchers at the University of Kent has found.

read more...

Arrested SpyEye author also developed mystery Tilon bank Trojan, says security firm

Arrested SpyEye author Aleksandr Panin was probably responsible for the Tilon bank Trojan, developed as a “side project” using the same source code as his more famous creation, an analysis by Dutch security firm Fox-IT has concluded.

read more...

Samsung's Knox 2.0 makes container and BYOD app security easier to use

Samsung has greatly enhanced the practicality of its Knox smartphone and tablet security system, adding the ability to deploy apps from Google Play and offering a dedicated KNOX Marketplace for business-class software.

read more...

Wi-Fi 'virus' could be used to attack wireless access points, researchers discover

Dense concentrations of Wi-Fi access points and routers in large cities could be attacked by malware able to spread silently from node to node, researchers at the University of Liverpool have shown for the first time.

read more...

Marussia Formula 1 team's race testing disrupted by Trojan malware

The Marussia Formula 1 racing team has admitted losing an entire day’s race testing in Bahrain last week after the computer systems used for in-car telemetry were disrupted by Trojan malware.

read more...

Pony botnet stole Bitcoins and Litecoins worth $220,000. Did anyone even notice?

The Pony botnet has infected hundreds of thousands of systems in a campaign that has netted cybercriminals at least $220,000 worth of virtual currencies, mainly Bitcoins and Litecoins, security firm Trustwave has revealed.

read more...

HP expands Threat Central intelligence sharing with clutch of security vendors

HP is expanding its Threat Central intelligence-sharing platform to crowdsource threat data from third-party security vendors, the firm has announced.

read more...

Samsung's Knox smartphone security integrated with Zscaler cloud

Samsung’s Knox mobile security platform has bolstered its status as the emerging standard in mobile enterprise device security by inking a deal with Zscaler to integrate its technology with the software.

read more...

Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map