Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

John E. Dunn


John is one of the co-founders of Techworld, following a spell working for Tornado Insider, the European magazine for tech start-ups. He started in IT journalism as technical editor of Personal Computer Magazine, before progressing to become editor of Network World (formerly LAN Magazine) and Network Week before helping to set up Techworld Insider. He has also freelanced for a number of technical publications in the technology, science and business fields.

His Techworld blog is War on Error

RSS Subscribe to John E. Dunn's RSS Feed

Email Contact John E. Dunn

Email John E. Dunn on Twitter

Email John E. Dunn on LinkedIn

All articles by John E. Dunn

Carbon Grabber campaign hunts for automotive industry logins

Europe’s automotive supply chain is being targeted by a malware campaign connected to the increasingly popular Carbon Grabber crimeware kit, researchers at Symantec have warned.


NSA and GCHQ moles feeding Tor Project with bug reports, claims executive director

The wizards of Tor are being fed bug reports by anonymous sources inside the agencies normally seen as trying to break its security, the NSA and GCHQ, the Project’s executive director Andrew Lewman has claimed in a BBC interview.


Spammers top spoofing targets are still finance and travel industries

The travel industry and large banks were the US industries most abused by spam and malicious email in the second quarter of 2014, according to Agari’s Email TrustIndex.


What happened to the Flashback Trojan? Turns out US universities are still riddled with it

US universities are still battling surprisingly high levels of malware infection among their student populations, mainly old forms considered neutralised years ago such as the Mac Flashback Trojan and Conficker worm, according to security firm BitSight Technologies.


Mystery TorrentLocker ransomware targets only Australian victims

Could the Russian ransomware masters hiding in their Eurasian fastness have an unlikely Australian malware rival?


HP's Stream laptop shows how confused Microsoft is about cloud computing

Plausible anti-Chromebook fightback or Microsoft throwing oranges at a gorilla? HP has called it the Stream and it’s the first model of what Microsoft hopes will grow into a low-cost notebook niche to take on the Chromebooks that have,...


Spam industry reinvented as messages containing malicious links surge

Spam might no longer be the gigantic overhead it once was but the number of unsolicited messages containing malicious links appears to be surging, according to figures from SaaS security firm ProofPoint.


Former employees have become 'application menace' new study claims

Many SME employees retain alarming levels of access to critical business applications after they've stopped working for a company, a survey for cloud services firm Intermedia has claimed.


Data breaches compromise seven million UK credit and debit cards since 2011, says Worldpay

Data breaches have compromised nearly seven million UK credit and debit cards over the last three years, with breached businesses each paying out almost a million in forensic and remediation costs, payments processor Worldpay has calculated.


Massive 300Gbps DDoS attack on media firm fuelled by unpatched server flaw

Hacktivists summoned up a massive and previously undocumented 300Gbps DDoS attack earlier this summer by exploiting an obscure motherboard-level flaw on 100,000 unpatched servers, VeriSign has revealed in its latest quarterly Trends report.


Ancient Stuxnet flaw still being used to attack millions of Windows XP PCs

A software vulnerability exploited by cyberweapons including Stuxnet and Flame is still being used to attack millions of users around the world four years after it was patched, a Kaspersky analysis has suggested.


Kovter blackmail Trojan hunts for victims as CryptoLocker fades

Infections caused by the innovative Kovter police blackmail Trojan continued to surge between May and June, security firm Damballa has reported. Could old-style police ransom attacks, once seen as past it, be on their way back with a vengeance?


The NCA has another go at cybercrime 'awareness'. Is anyone listening?

Britain's security mandarins are going through the motions. Awareness is not going to dent an issue while the technology is at fault Four in ten UK computer users still don’t install security software on PCs or mobile devices despite the...


Android Trojan passes off crafty RAT as ESET security software

Security firm ESET has discovered a crafty Android ‘backdoor’ remote access Trojan (RAT) passing itself off as a variety of apps, including the firm’s own Mobile Security software.


Chromebooks sales predicted to hit 14.2 million by 2017. Will this wake Nadella up?

Global sales of Google’s Chromebooks will rise 79 percent this year reach 5.2 million units and will reach to 14.2 million by 2017, Gartner has said. Not bad for a computer platform that still isn’t sold in many countries.


Magnitude exploit kit changes tack to make money from CryptoWall ransomware

The Russian Magnitude malware exploit kit has moved on to the territory vacated by the defunct Blackhole Exploit Kit after successfully developing a new and highly profitable business model, according to security firm Trustwave.


London is laptop, smartphone and tablet theft capital of UK, police figures confirm

Four out of ten electronic devices reported stolen in the UK last year belonged to people living or working in London, a Freedom of Information analysis by security firm ViaSat UK has found.


Gemalto pounces on SafeNet for cloud encryption and authentication

European smartcard security vendor Gemalto has announced a deal to buy US cloud and encryption management vendor SafeNet for $890 million (£530 million).


Yahoo ad system used to push CryptoWall ransom 'malvertising'

The world has come to fear the effects of ransom malware but how does it get near the PCs of its victims in the first place?


SynoLocker NAS ransomware - was February 'PWNED' attack a warning of trouble?

SynoLocker was not the first malware to target a serious software vulnerability in DiskStation software Could the unprecedented attack on users of Synology’s DiskStation NAS storage drives by ransom malware have been stopped before it...


Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map