Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

John E Dunn


John is one of the co-founders of Techworld, following a spell working for Tornado Insider, the European magazine for tech start-ups. He started in IT journalism as technical editor of Personal Computer Magazine, before progressing to become editor of Network World (formerly LAN Magazine) and Network Week before helping to set up Techworld Insider. He has also freelanced for a number of technical publications in the technology, science and business fields.

His Techworld blog is War on Error

RSS Subscribe to John E Dunn's RSS Feed

Email Contact John E Dunn

Email John E Dunn on Twitter

Email John E Dunn on LinkedIn

All articles by John E Dunn

Windows XP flaws help Russian 'Qbot' gang build 500,000 PC botnet

The Russian gang behind the obscure Qbot botnet have quietly built an impressive empire of 500,000 infected PCs by exploiting unpatched flaws in mainly US-based Windows XP and Windows 7 computers, researchers at security firm Proofpoint have discovered.


German 'Pi Vessel' pitches Raspberry Pi as home computer

The Raspberry Pi model B has engineered a small revolution in education and home enthusiast computing but could it also be put to work as a usable home office system?


German 'Pi Vessel' pitches Raspberry Pi as home computer

The Raspberry Pi model B has engineered a small revolution in education and home enthusiast computing but could it also be put to work as a usable home office system?


Exabeam trials user monitoring technology on Safeway network

Security startup Exabeam has launched itself out of stealth purdah with a new technology that tracks and risk-scores user behaviour as a way of overcoming the limitations of complex, ‘noisy’ SIEM monitoring.


Firedrive mystery deepens – is this cloud storage site coming back?

After six days without service and counting, users of the popular cloud storage site Firedrive are starting to ask the dreaded question – is the service (and the widely-linked files stored on it) coming back?


ComputerCOP parental surveillance is poorly-made 'spyware', says angry EFF

The ComputerCOP home monitoring program widely promoted by US police forces to members of the public as far back the 1990s is really a piece of poorly-engineered “spyware” home users should steer well clear of, according to the Electronic Frontier Foundation (EFF).


Windows PCs still riddled with unpatched Java, QuickTime and Adobe Reader

US Windows users remain badly exposed to dozens of basic software vulnerabilities, according to third quarter 2014 figures from Danish security firm Secunia. Java was by far the worst offender with 42 percent of systems unpatched against one or more flaws.


Palo Alto next-gen firewall marked a 'caution' in NSS Labs test

Do independent security tests make or break products? Normally not but the latest assessment of next-generation firewalls (NGFWs) by testing firm NSS Labs will make mixed reading for some of the products with one – Palo Alto’s PA-3020 – described as “below average” with a rating of “caution”.


Cheryl Cole crowned 'most dangerous' UK malware lure of 2014

Cheryl Cole of the hit TV show X Factor is now the most ‘dangerous’ celebrity UK Internet users can punch into a search engine, according to McAfee’s SiteAdvisor security filter.


PwC reports finds security spending is falling – isnt this what security vendors promised?

Nothing gets a rise out of security vendors like a good story about under-investment and spending cuts by the very enterprises that a hundred headlines a week tell us are being plundered by cyber-criminals at will.


UK security startup WEDG hits £71,000 Indiegogo target in days

Only weeks after failing to reach its funding target on Kickstarter, UK security startup WEDG has walked home with the £71,000 ($116,000) it asked for on smaller rival Indiegogo, its founders have announced.


FBI opens malware tool to public as part of radical crowdsourcing plan

The FBI is close to allowing anonymous outsiders to use its Malware Investigator tool for the first time through a dedicated crowdsourcing portal, an official reportedly confirmed at last week’s Virus Bulletin conference.


Internet criminals migrating to hide inside 'darknets' warns Europol

As if tackling the malware economy wasn’t already hard enough, police forces face a massive task keeping tabs on the ‘darknet’ of anonymisation services that are being used by criminals to hide themselves, Europol’s latest Internet Organised Crime Assessment (iOCTA) has argued.


SAM 'electronic lego for kids' project storms Kickstarter on day one

It’s called ‘SAM’, it launched on Kickstarter today, and its makers believe they’ve cracked one of the most difficult problems in educational computing – how to teach young minds the secrets of getting electronic devices and computer code to work together.


BYOD firms remotely wipe 130,000 mobile devices every year, finds Fiberlink

Remotely wiping mobile devices is proving to be a hugely popular feature for enterprises and IBM’s Fiberlink division has some numbers to prove it. The firm's figures show that an average of 450 mobile devices are now being wiped every day by users of its MaaS360 cloud platform.


National Crime Agency to feed UK banks real-time cyber-alerts

Britain’s banks are to start using a new alerting system that will make it easier for a range of police and government agencies to warn its members of of cyberattacks and frauds in real time.


Bash 'shellshock' flaw is serious because fixing it will depend on manual intervention

Sometimes security makes you feel tired. Less than six months after Heartbleed, the security industry now has had the potentially even more serious Bash or ‘Shellshock’ CVE-2014-6271 flaw dumped in its lap. Exactly how serious is open to some interpretation but everyone seems to agree on one thing – this one won’t be easy to fix.


Chinese 'Spike' DDoS botnet targets Windows, Linux and IoT devices

Akamai’s Prolexic division has warned of the growing threat from a Chinese toolkit that has started infecting Linux, Windows and embedded systems in order to launch DDoS attacks peaking at hundreds of Gigabits per second.


Blackphone and Silent Circle offer $128 bounty for security flaws

The Bugcrowd-managed program covers the PrivatOS software that runs Blackphone’s Android fork plus all network and cloud services, most though not all website flaws and vulnerabilities detected on the Silent Circle suite of secure apps used by the handset.


Apple's iPhone 6 Touch ID has same fingerprint failings as 5s

The Touch ID fingerprint security that comes with Apple’s iPhone 6 is no better at resisting sophisticated print-lifting attacks than the iPhone 5s on which the system made its debut, according to a researcher from mobile security firm Lookout.


Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map