Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

John E Dunn

Biography

John is one of the co-founders of Techworld, following a spell working for Tornado Insider, the European magazine for tech start-ups. He started in IT journalism as technical editor of Personal Computer Magazine, before progressing to become editor of Network World (formerly LAN Magazine) and Network Week before helping to set up Techworld Insider. He has also freelanced for a number of technical publications in the technology, science and business fields.

His Techworld blog is War on Error


RSS Subscribe to John E Dunn's RSS Feed

Email Contact John E Dunn

Email John E Dunn on Twitter

Email John E Dunn on LinkedIn


All articles by John E Dunn

McAfee's Next Generation Firewall spies greatness in security integration

McAfee has upgraded its Next Generation Firewall, pushing the product’s increasing integration with the other parts of the firm’s security ecosystem as the feature that gives it an edge over rivals.

read more...

European suffered 229 public data breaches since 2004, study suggests

US organisations now suffer so many data breaches it has become a full time job simply documenting them. But what has been going on in Europe?

read more...

Imation H300 portable hard drive can be managed from the cloud

Imation thinks it has come up with a solution to the problems enterprises and public sector organisations have when securing easily-lost portable storage – make drives remotely manageable from the cloud.

read more...

Public sector should be careful with BYOD, says new CESG guidance

The UK Communications-Electronics Security Group(CESG) has issued tough new guidance on how the public sector should approach the thorny issue of BYOD for its workforce.

read more...

DDoS attackers start using SSDP to fuel large reflection attacks

The obscure Simple Service Discovery Protocol (SSDP) has become the latest obscure-but-occasionally useful protocol to be harnessed by DDoS attackers, Arbor Networks’ Q3 traffic report has noticed.

read more...

DDoS attackers start using SSDP to fuel large reflection attacks

The obscure Simple Service Discovery Protocol (SSDP) has become the latest obscure-but-occasionally useful protocol to be harnessed by DDoS attackers, Arbor Networks’ Q3 traffic report has noticed.

read more...

Bugzilla disaster averted - patches released for major flaw in open source platform

The Bugzilla open source flaw-tracking platform has patched a potentially disastrous security flaw that would have allowed an attacker to subvert the developer registration process in order to gain privileged access to information on zero days submitted to the site.

read more...

Windows XP flaws help Russian 'Qbot' gang build 500,000 PC botnet

The Russian gang behind the obscure Qbot botnet have quietly built an impressive empire of 500,000 infected PCs by exploiting unpatched flaws in mainly US-based Windows XP and Windows 7 computers, researchers at security firm Proofpoint have discovered.

read more...

German 'Pi Vessel' pitches Raspberry Pi as home computer

The Raspberry Pi model B has engineered a small revolution in education and home enthusiast computing but could it also be put to work as a usable home office system?

read more...

German 'Pi Vessel' pitches Raspberry Pi as home computer

The Raspberry Pi model B has engineered a small revolution in education and home enthusiast computing but could it also be put to work as a usable home office system?

read more...

Exabeam trials user monitoring technology on Safeway network

Security startup Exabeam has launched itself out of stealth purdah with a new technology that tracks and risk-scores user behaviour as a way of overcoming the limitations of complex, ‘noisy’ SIEM monitoring.

read more...

Firedrive mystery deepens – is this cloud storage site coming back?

After six days without service and counting, users of the popular cloud storage site Firedrive are starting to ask the dreaded question – is the service (and the widely-linked files stored on it) coming back?

read more...

ComputerCOP parental surveillance is poorly-made 'spyware', says angry EFF

The ComputerCOP home monitoring program widely promoted by US police forces to members of the public as far back the 1990s is really a piece of poorly-engineered “spyware” home users should steer well clear of, according to the Electronic Frontier Foundation (EFF).

read more...

Windows PCs still riddled with unpatched Java, QuickTime and Adobe Reader

US Windows users remain badly exposed to dozens of basic software vulnerabilities, according to third quarter 2014 figures from Danish security firm Secunia. Java was by far the worst offender with 42 percent of systems unpatched against one or more flaws.

read more...

Palo Alto next-gen firewall marked a 'caution' in NSS Labs test

Do independent security tests make or break products? Normally not but the latest assessment of next-generation firewalls (NGFWs) by testing firm NSS Labs will make mixed reading for some of the products with one – Palo Alto’s PA-3020 – described as “below average” with a rating of “caution”.

read more...

Cheryl Cole crowned 'most dangerous' UK malware lure of 2014

Cheryl Cole of the hit TV show X Factor is now the most ‘dangerous’ celebrity UK Internet users can punch into a search engine, according to McAfee’s SiteAdvisor security filter.

read more...

PwC reports finds security spending is falling – isnt this what security vendors promised?

Nothing gets a rise out of security vendors like a good story about under-investment and spending cuts by the very enterprises that a hundred headlines a week tell us are being plundered by cyber-criminals at will.

read more...

UK security startup WEDG hits £71,000 Indiegogo target in days

Only weeks after failing to reach its funding target on Kickstarter, UK security startup WEDG has walked home with the £71,000 ($116,000) it asked for on smaller rival Indiegogo, its founders have announced.

read more...

FBI opens malware tool to public as part of radical crowdsourcing plan

The FBI is close to allowing anonymous outsiders to use its Malware Investigator tool for the first time through a dedicated crowdsourcing portal, an official reportedly confirmed at last week’s Virus Bulletin conference.

read more...

Internet criminals migrating to hide inside 'darknets' warns Europol

As if tackling the malware economy wasn’t already hard enough, police forces face a massive task keeping tabs on the ‘darknet’ of anonymisation services that are being used by criminals to hide themselves, Europol’s latest Internet Organised Crime Assessment (iOCTA) has argued.

read more...

Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map