Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

John E Dunn

Biography

John is one of the co-founders of Techworld, following a spell working for Tornado Insider, the European magazine for tech start-ups. He started in IT journalism as technical editor of Personal Computer Magazine, before progressing to become editor of Network World (formerly LAN Magazine) and Network Week before helping to set up Techworld Insider. He has also freelanced for a number of technical publications in the technology, science and business fields.

His Techworld blog is War on Error


RSS Subscribe to John E Dunn's RSS Feed

Email Contact John E Dunn

Email John E Dunn on Twitter

Email John E Dunn on LinkedIn


All articles by John E Dunn

Samsung's Knox 2.0 makes container and BYOD app security easier to use

Samsung has greatly enhanced the practicality of its Knox smartphone and tablet security system, adding the ability to deploy apps from Google Play and offering a dedicated KNOX Marketplace for business-class software.

read more...

Wi-Fi 'virus' could be used to attack wireless access points, researchers discover

Dense concentrations of Wi-Fi access points and routers in large cities could be attacked by malware able to spread silently from node to node, researchers at the University of Liverpool have shown for the first time.

read more...

Marussia Formula 1 team's race testing disrupted by Trojan malware

The Marussia Formula 1 racing team has admitted losing an entire day’s race testing in Bahrain last week after the computer systems used for in-car telemetry were disrupted by Trojan malware.

read more...

Pony botnet stole Bitcoins and Litecoins worth $220,000. Did anyone even notice?

The Pony botnet has infected hundreds of thousands of systems in a campaign that has netted cybercriminals at least $220,000 worth of virtual currencies, mainly Bitcoins and Litecoins, security firm Trustwave has revealed.

read more...

HP expands Threat Central intelligence sharing with clutch of security vendors

HP is expanding its Threat Central intelligence-sharing platform to crowdsource threat data from third-party security vendors, the firm has announced.

read more...

Samsung's Knox smartphone security integrated with Zscaler cloud

Samsung’s Knox mobile security platform has bolstered its status as the emerging standard in mobile enterprise device security by inking a deal with Zscaler to integrate its technology with the software.

read more...

Windows license fee cut to $15? This is as good as marketing gets

read more...

Best-selling home wireless routers wide open to attack, study finds

Many of the best-selling consumer and SOHO wireless routers are wide open to attackers thanks to known software vulnerabilities and poor configuration, a study by security firm Tripwire has found.

read more...

Chromebooks and Linux on the rise, ad network traffic numbers show

read more...

The Syrian Electronic Army attack on Forbes shows the irresistible power of phishing

read more...

Game firm hit with £45,000 fine for deceptive Pac Man game

A UK game firm has been fined £45,000 ($74,000) for using a bogus web game distributed on Facebook and Tumblr to trick mobile users into agreeing to receive weekly premium-rate texts.

read more...

Europe's mobile criminals migrate to 'chargeware' fraud for richer pickings

Tougher regulatiory intervention in Europe has caused criminals to move away from traditional premium SMS fraud in favour of newer cons such as chargeware, mobile security firm Lookout Mobile Security has reported.

read more...

Bit9's new Carbon Black sensor to be integrated with Check Point firewalls

Days after merging its operations with tiny startup Carbon Black, US security firm Bit9 has announced a new deal that will see its technology integrated with Check Point firewalls.

read more...

New website ranks worst global data breaches using Richter-like scale

Data breaches are a bad thing but are some worse than others in a way that can be measured objectively?

read more...

Healthcare dominates US data breach incidents, latest figures show

The healthcare sector accounted for more than four out of ten US customer data breaches recorded by the non-profit Identity Theft Resource Center (ITRC) in 2013, the organisation’s latest figures show.

read more...

Pastebin analysis reveals true scale of 2013 data breaches

The true scale of global data breaches must reach into the hundreds of millions, according to Swiss penetration testing outfit High-Tech Bridge which has discovered that 311,095 user credentials were posted to the popular Pastebin website during 2013 alone.

read more...

The simple way to stop serious Microsoft software flaws? Take away 'admin' rights

Running Windows users with ‘standard’ rather than ‘administrator’ rights would have removed over 90 percent of the risk posed by critical vulnerabilities reported in Microsoft products last year, an analysis by privilege management firm Avecto has found.

read more...

The Syrian Electronic Army wins again as 1 million Forbes accounts breached

The Syrian Electronic Army (SEA) has struck again, defacing the Forbes news website and publishing the names, email addresses and encrypted passwords of over a million of its users.

read more...

Target breach started with phishing attack on contractor, researcher alleges

The air conditioning firm whose remote access credentials were abused in the massive Target data breach probably had them stolen by a run-of-the-mill phishing attack, a security researcher has reported.

read more...

Bit9 merges with Carbon Black for APT incident response technology

Up and coming US security firm Bit9 has merged with small but high-regarded ‘incident response’ startup Carbon Black in a deal that will also see $38.25 million (£23.3 million) of venture funding used to seed the joint operation going forward.

read more...

Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map