Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

John E Dunn

Biography

John is one of the co-founders of Techworld, following a spell working for Tornado Insider, the European magazine for tech start-ups. He started in IT journalism as technical editor of Personal Computer Magazine, before progressing to become editor of Network World (formerly LAN Magazine) and Network Week before helping to set up Techworld Insider. He has also freelanced for a number of technical publications in the technology, science and business fields.

His Techworld blog is War on Error


RSS Subscribe to John E Dunn's RSS Feed

Email Contact John E Dunn

Email John E Dunn on Twitter

Email John E Dunn on LinkedIn


All articles by John E Dunn

The eBay breach is part of a pattern - big brands can no longer protect their users

read more...

Check Point plots to disrupt threat intelligence market with new IntelliStore feeds

Security giant Check Point has launched a pioneering new market for real-time security threats it hopes will offer a way for smaller third-party security firms to embed their intelligence on cyberattacks and malware directly into the real-time filtering applied by the company’s security products.

read more...

Worried US retailers battle cyber-attacks through new intelligence-sharing body

Stung into action by a wave of devastating data breaches, US retailers have taken the historic decision to share data on cyber-threats for the first time through a new initiative, the Retail Cyber Intelligence Sharing Center (R-CISC).

read more...

Smartphone battery dead? UK startup launches world's first charge rental service

Tiny British startup SaveSquared has launched a service it believes can cure the affliction of smartphones and tablets that run out of power while out and about - power up the device by renting a portable recharger from a nearby shop.

read more...

Average US business fields 10,000 security alerts per day, Damballa analysis finds

The average North American enterprise fields around 10,000 alerts each day from its security systems, far more than their IT teams can possibly process, a Damballa analysis of Q1 2014 traffic has found.

read more...

NetClean forensic tool gives police way of analysing growing volume of image evidence

Image forensics firm NetClean Technologies has come up with a way to use its world-renowned child porn image-fingerprinting technology to help police document and investigate images and videos connected to a much wider range of crimes.

read more...

ICO turns teacher with hit-list of top data breach weaknesses

The Information Commissioner’s Office (ICO) is burnishing its credentials as a centre of best practice by publishing a hit-list of the top security weaknesses that are the root cause of many of the data breaches it investigates.

read more...

Is Windows 7 more vulnerable than XP? In fact 'Rotbrow' malware is a warning for all Windows users

read more...

FireEye finds another piece of its security jigsaw

read more...

Reveton malware biggest ransom menace of 2013, Microsoft's SIR report finds

Cryptolocker ravaged computer users in late 2013 but it was still only the seventh most common form of ransom malware for the second half of the year, Microsoft’s latest Security Intelligence Report (SIR) has calculated using the firm's inhouse Windows user data.

read more...

Anti-virus pioneer Alan Solomon thinks anti-virus is dead. He uses Linux instead

read more...

DDoS attacks increasingly used as diversions for data theft or fraud

A growing number of the DDoS attacks that hit UK organisations in 2013 were probably diversions designed to distract defenders from attempted data breaches or frauds, a survey and analysis by mitigation firm Neustar has suggested.

read more...

US Navy sysadmin charged with 'Team Digi7al' hacktivist attacks on military

A sysadmin who worked in the nuclear reactor department of a US warship used his privileged access to hack Navy databases before boasting of the exploits on Twitter, US Government prosecutors have alleged.

read more...

Criminals target Android smartphones with reheat of 'police ransom' attacks

Security researchers have discovered a crude malware Trojan targeting Android smartphone users using the same ‘police ransom’ tactics that scammed large numbers PC users three years ago.

read more...

Antivirus is 'dead' says Symantec security head as firm launches more services and cloud security

With antivirus software revenue falling, security giant Symantec has finally conceded a point that has seemed obvious to the rest of the industry for some time. Antivirus software “is dead”, senior vice president for information security Brian Dye has told the Wall Street Journal.

read more...

Admins offered geo-mapping feature on iboss web gateway to spot data theft

Web filtering outfit iboss Network Security has added an innovative geo-mapping capability to its gateway platform to visually alert admins to unusual movements of data in and out of a network more rapidly than trawling through conventional logs.

read more...

Microsoft caves in and patches XP's nasty zero-day

read more...

Microsoft caves in and patches XP's nasty zero-day

read more...

Microsoft Office applications barely used by many employees, new study shows

Organisations are wasting money licensing Microsoft Office applications that the majority of employees barely use, a study released this week by application analytics startup SoftWatch has found. Conclusion: many users could easly be migrated to far cheaper cloud applications such as Google Apps.

read more...

TDL4 rootkit can be modified to pwn any security product, Bromium researchers discover

Kernel mode rootkits are more viable than has been realised and could be used to bypass more or less any security product in existence, researchers at Bromium have discovered after conducting a proof-of-concept attack using a modified variant of in the infamous TDL4 malware.

read more...

Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map