Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

John E Dunn


John is one of the co-founders of Techworld, following a spell working for Tornado Insider, the European magazine for tech start-ups. He started in IT journalism as technical editor of Personal Computer Magazine, before progressing to become editor of Network World (formerly LAN Magazine) and Network Week before helping to set up Techworld Insider. He has also freelanced for a number of technical publications in the technology, science and business fields.

His Techworld blog is War on Error

RSS Subscribe to John E Dunn's RSS Feed

Email Contact John E Dunn

Email John E Dunn on Twitter

Email John E Dunn on LinkedIn

All articles by John E Dunn

Italian council workers forced to pay 400 euro TorrentLocker ransom

As if the Italian economy isn’t in a bad enough state, organisations in the country have been plagued by a spate of attacks by the unpleasant TorrentLocker ransomware, with at least one local government office being forced to pay 'i criminali' hundreds of euros to get back critical data.


Russia's shadowy 'APT28' hackers targeting pro-Western governments since 2007

A Russian state-backed hacking group dubbed ‘APT28’ has for the last decade systematically targeted NATO and a raft of East European and Caucasus governments with espionage malware, research by security firm FireEye has confirmed.


Malware attack steals £1.6 million from dozens of UK cash machines

Police have revealed news of a spectacular malware attack by an East European gang in May that managed to steal £1.6 million ($2.5 million) from dozens of ATM machines in cities across the UK.


Disaster as CryptoWall encrypts US firm's entire server installation

“Here is a tale of ransomware that will make your blood run cold,” announced Stu Sjouwerman of security training firm KnowBe4 in a company newsletter this week and he wasn’t exaggerating.


CryptoWall ransom infections spike to 830,000 in matter of weeks

Dell SecureWorks has updated its figures on the number of PCs infected by the awful CryptoWall ransom malware and the news isn’t good – the number of systems has spiked suddenly to 830,000.


Googles 2-Step Verification – why everybody should turn this on now

Online accounts such as Google are a major target for criminals and yet disturbingly large numbers of people protect this asset with little more than an email address and a weak password.


Koler Android ransomware spreading in US as SMS worm, warns AdaptiveMobile

The Koler Android ransom Trojan is spreading in the US after turning itself into an SMS worm, it has been reported. It's a tactic that could allow a rare piece of mobile malware to escape the nether-world of sideloaded apps from dodgy porn sites.


FBI backtracks on Russian involvement in JPMorgan Chase breach

Last summer’s vast and hugely symbolic plundering of customer accounts at US banks JPMorgan Chase & Co might not have been the work of Russian hacktivists protesting about sanctions, the FBI has told US journalists at a round table briefing.


Criminals traded 110 million stolen credentials in 2014, Experian says

The volume of stolen data traded by criminals reached 110 million this year, overwhelmingly online credentials such as user names and passwords, credit agency Experian has estimated using its own web monitoring system.


UK verticals top hit-list for targeted APT attacks, says FireEye

Targeted and malware attacks on European organisations doubled in the first half of 2014 with government, energy, finance and telecoms in the UK and Germany the hot targets, according to FireEye’s latest EMEA Threat Report.


Android 5.0 Lollipop – top enterprise security features

The newly announced Android 5.0 ‘Lollipop’ offers probably the biggest security overhaul of the mobile operating system since it first appeared and most of it is aimed squarely at attracting a bigger uptake in enterprises and mounting a more effective challenge to Apple’s iOS.


Russian cybercriminals made $680 million from stolen credit cards

The Russian-based cybercriminals currently plundering US retailers could be making as much as $680 million (£425 million) a year from their thefts, a security consultancy in the country has estimated.


McAfee's Next Generation Firewall spies greatness in security integration

McAfee has upgraded its Next Generation Firewall, pushing the product’s increasing integration with the other parts of the firm’s security ecosystem as the feature that gives it an edge over rivals.


European suffered 229 public data breaches since 2004, study suggests

US organisations now suffer so many data breaches it has become a full time job simply documenting them. But what has been going on in Europe?


Imation H300 portable hard drive can be managed from the cloud

Imation thinks it has come up with a solution to the problems enterprises and public sector organisations have when securing easily-lost portable storage – make drives remotely manageable from the cloud.


Public sector should be careful with BYOD, says new CESG guidance

The UK Communications-Electronics Security Group(CESG) has issued tough new guidance on how the public sector should approach the thorny issue of BYOD for its workforce.


DDoS attackers start using SSDP to fuel large reflection attacks

The obscure Simple Service Discovery Protocol (SSDP) has become the latest obscure-but-occasionally useful protocol to be harnessed by DDoS attackers, Arbor Networks’ Q3 traffic report has noticed.


DDoS attackers start using SSDP to fuel large reflection attacks

The obscure Simple Service Discovery Protocol (SSDP) has become the latest obscure-but-occasionally useful protocol to be harnessed by DDoS attackers, Arbor Networks’ Q3 traffic report has noticed.


Bugzilla disaster averted - patches released for major flaw in open source platform

The Bugzilla open source flaw-tracking platform has patched a potentially disastrous security flaw that would have allowed an attacker to subvert the developer registration process in order to gain privileged access to information on zero days submitted to the site.


Windows XP flaws help Russian 'Qbot' gang build 500,000 PC botnet

The Russian gang behind the obscure Qbot botnet have quietly built an impressive empire of 500,000 infected PCs by exploiting unpatched flaws in mainly US-based Windows XP and Windows 7 computers, researchers at security firm Proofpoint have discovered.


Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map