Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

John E Dunn

Biography

John is one of the co-founders of Techworld, following a spell working for Tornado Insider, the European magazine for tech start-ups. He started in IT journalism as technical editor of Personal Computer Magazine, before progressing to become editor of Network World (formerly LAN Magazine) and Network Week before helping to set up Techworld Insider. He has also freelanced for a number of technical publications in the technology, science and business fields.

His Techworld blog is War on Error


RSS Subscribe to John E Dunn's RSS Feed

Email Contact John E Dunn

Email John E Dunn on Twitter

Email John E Dunn on LinkedIn


All articles by John E Dunn

Boom in web comment spam driven by hardcore of abusers, says Imperva

The boom in comment spam is controlled by a small hardcore of abusers that have hit on a way to game Google’s search algorithms in order to spread advertising and malware, according to a new report from security firm Imperva.

read more...

Police department defiant despite crippling CryptoWall ransom attack

Another US police department has had its computer systems brought to their knees by a ransom Trojan, but this one has made it clear that it has no plans to pay the criminals to get lost files back.

read more...

Celebrity email hacker extraordinaire 'Guccifer' gets four years behind bars

By day he was a small-town cab driver, by night a man who hacked celebrities out of satirical spite; celebrity hacker ‘Guccifer’ has been sentenced to a minimum of four years in jail by a Romanian court.

read more...

CryptoLocker ransomware infections collapse after Gameover takedown, researchers estimate

This week’s global police assault on the vast P2P Gameover Zeus botnet has left the distribution system for the Cryptolocker ransom malware floundering, according to two Danish security firms that have been monitoring new infections.

read more...

Researchers spot first ever Android ransom attack that ENCRYPTS data files

Researchers working for security firm ESET have discovered the first ever malware capable of encrypting data files on an Android smartphone as part of a full-blown 'Cryptolocker-style' ransom attack.

read more...

Middle-Eastern 'Molerats' hackers return to take bite out of the BBC

The burrowing Middle-Eastern ‘Molerats’ hackers have been at it again. First spotted last year, security firm FireEye has recently noticed a widening target list taking in financial firms, a clutch of governments and even the BBC.

read more...

Gameover Zeus - the sudden unmasking of cybercrime's most wanted

read more...

Operation Tovar disconnects Gameover Zeus and CryptoLocker malware - but only for two weeks

Global police forces have collaborated to temporarily disrupt the world’s most successful botnet, Gameover Zeus (aka P2PZeus or GoZeus), giving hundreds of thousands of victims a brief window in which they can more easily extricate themselves from its clutches.

read more...

NSA building global identity database from intercepted images, new Snowden documents reveal

The NSA is processing millions of facial images from intercepted communications as part of a program to build a global identity database of persons of interest, documents from the Edward Snowden cache seen by the New York Times have revealed.

read more...

Data breaches aren't about credit cards or passwords. What is at risk here are people's identities

read more...

Fear and confusion as iconic TrueCrypt security tool tells world to use BitLocker

Something decidedly odd has befallen the hugely popular and iconic TrueCrypt encryption utility used by security-aware users the world over to encrypt data with the plausible certainty that even the NSA geeks with pocket protectors won’t be able to break it.

read more...

US healthcare and pharmaceutical firms given lower security rating in new analysis

Cybersecurity among the largest US health and pharmaceutical organisations has fallen behind sectors such as finance, utilities and even retail, an analysis of S&P 500 firms has found.

read more...

Google calls time on third-party Chrome extensions to turn security screw

Google Chrome users on Windows can now only install browser extensions through the Web Store, the search giant has announced, fulfilling a long-standing promise to tighten security.

read more...

CryptoDefense ransom malware using Java drive-by exploit to boost infection rate

The gang behind the CryptoDefense ransom malware has been distributing it using a simple Java drive-by attack as a way of boosting the number of victims, security firm Bromium has confirmed after analysing a version that appeared in March.

read more...

Apple users hit by $100 ransom demand after mystery iCloud account breach

Apple iPhone, iPad and Mac users in Australia and New Zealand are being pestered by mysterious ransom messages demanding up to $100 in order to 'unlock' their devices. A hack of some iCloud user accounts is suspected.

read more...

Avast pulls support forum after hackers pwn 400,000 user accounts

Anti-virus firm Avast Software has taken its user support forum offline after hackers broke into the system at the weekend and compromised around 400,000 of its registered users.

read more...

F5 Networks pounces on fledgling anti-DDoS startup Defense.Net

Less than a year on from its launch, DDoS fledgling Defense.Net has been bought by F5 Networks for an undisclosed sum.

read more...

Antivirus software can't keep up with new malware, Lastline Labs analysis finds

Brand new malware is detected by only around half of antivirus programs on the day it first appears, an analysis by security startup Lastline Labs has found after running samples through the VirusTotal online scanner.

read more...

Cyberwar fact - China's PLA 61398 hackers enjoy a two-hour lunch break

read more...

The eBay breach is part of a pattern - big brands can no longer protect their users

read more...

Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map