Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

John E. Dunn

Biography

John is one of the co-founders of Techworld, following a spell working for Tornado Insider, the European magazine for tech start-ups. He started in IT journalism as technical editor of Personal Computer Magazine, before progressing to become editor of Network World (formerly LAN Magazine) and Network Week before helping to set up Techworld Insider. He has also freelanced for a number of technical publications in the technology, science and business fields.

His Techworld blog is War on Error


RSS Subscribe to John E. Dunn's RSS Feed

Email Contact John E. Dunn

Email John E. Dunn on Twitter

Email John E. Dunn on LinkedIn


All articles by John E. Dunn

Mystery 'Onion/Critroni' ransom Trojan evolves to use more sophisticated encryption

Kaspersky Lab has added more detail on the fiendish ‘Onion’ (aka 'Critroni') ransom Trojan that uses the Tor anonymity service to hide its command and control (C&C) as well as displaying a level of thoughtfulness about its encryption design that bodes ill for future attacks.

read more...

Nigerian 419 scammers diversifying into Trojan malware, finds Palo Alto

A Nigerian cybercrime gang versed in 419 social engineering scams has diversified into using off-the-shelf RAT tools to attacks Taiwanese and South Korean businesses, according to researchers working for Palo Alto Networks.

read more...

Internet Explorer vulnerabilities surge to record levels in 2014, NVD figures reveal

Microsoft’s Internet Explorer experienced a record number of software vulnerabilities in the first half of 2014, far above any other popular program, a Bromium analysis of US National Vulnerability Database (NVD) figures has shown.

read more...

Third of UK IT professionals would completely overhaul network security if they could, Websense finds

With complex threats lapping over networks wouldn’t security be improved by simply starting afresh? Fanciful perhaps but a third of experienced UK-based IT staff in a new Websense survey said they’d consider at least a “complete overhaul” if resources made it possible.

read more...

Russian cyberweapons cross-pollinating commercial malware, analysis claims

Sophisticated code of the sort used in Russian Government cyberweapons could be seeping into the commercial malware wielded by the country's criminals, a security firm has suggested after analysing the apparent cross-pollination in a previously unknown piece of malware called ‘Gyges’.

read more...

CryptoWall ransom malware struck US brokerage Benjamin F. Edwards & Co

US brokerage Benjamin F. Edwards & Co has admitted that it could have suffered a data breach earlier this year after an employee at the firm became infected with the CryptoWall ransom malware, it has emerged.

read more...

Phishing gang stole money from Apple users to fund UK criminal network

A man and a woman have been handed a total of 14 years in jail for a phishing scam the proceeds of which were used to buy air tickets for Romanian criminals wanting to travel to the UK.

read more...

Facebook users still an irresistible target for phishing attackers, says Kaspersky

Phishing attacks from inside Facebook have fallen back from the historic peak of 2013 but still constitute 1 in 10 of all attacks of this type blocked by Kaspersky’s security software, the firm has reported.

read more...

Google's Project Zero flaw programme - do-gooding spin or a much-needed evolution?

It turns out that flaw bounties won't do it on their own. Google is the first to realise this. Germany had its post-WW2 Year Zero, New York has Ground Zero and now Google has added its name to the list with Project Zero, a crack security team the...

read more...

Wave of 100Gbps 'mega' DDoS attacks hits record level in 2014

Huge DDoS attacks are becoming a regular occurrence with over 100 incidents breaching the psychological 100Gbps barrier that used to be seen as signifying trouble, new figures from Arbor Networks have confirmed.

read more...

Panda Security's new CEO plots reboot 2.0 for resurgent security brand

Panda Security is the plucky Spanish antivirus firm that stormed the international market nearly a decade ago as malware threats boomed, beating most of its rivals to the idea of cloud security as an alternative to signature scanning. Well regarded technically and apparently successful, around 2010 the firm suddenly hit a sales wall.

read more...

Android apps ask for too many intrusive permissions, Zscaler analysis finds

In the economy of mobile apps, you are less a consumer of software than consumed by it. That's according to security firm Zscaler that has analysed the surprisingly intrusive permissions demanded by many popular Google App store apps before they will allow a download to start.

read more...

LastPass tells users about two security flaws - a year after they were fixed

LastPass fixed two software flaws in its popular password manager nearly a year ago after being informed of their existence by a researcher, the firm has admitted.

read more...

Google adopts plain English for new Chrome browser warnings

The smallest changes are sometimes the best ones Google is preparing a small but important tweak to the malware warnings thrown up when Chrome encounters a page blacklisted by Safe Browsing security, the firm has sneaked out in a Twitter...

read more...

Chinese businessman used tech firm to hack US aircraft programmes, US alleges

A Chinese businessman used the cover of his aviation firm to steal data on US military aircraft programmes which was then hawked around companies in his home country, the US Department of Justice has alleged.

read more...

Windows XP users left high and dry as Oracle ends Java support

Windows XP hold-outs pay attention. If you run the Java runtime on XP, it looks as if the current version is about as good as it gets. The next version, 7u65 and 8u11, due to ship in the middle of July, will not support or run on XP.

read more...

Bolware payment malware swindles Brazilians out of staggering $3.75 billion, says RSA

Brazilians using the country’s Boleto Bancário money payment system could have been swindled out of as much as a staggering $3.75 billion (£2.2 billion) by a piece of malware called 'Bolware, according to a new analysis by security firm RSA Security.

read more...

MiniDuke state cyber-weapon re-used Russian 'Cosmu' Trojan, F-Secure says

Some versions of the mysterious MiniDuke malware discovered last year targeting European governments shared code with a Trojan tracing its origins back to the early years of the commercial Internet, a new analysis by Finnish firm F-Secure has found.

read more...

Expert slams HotelHippo booking website after finding multiple security woes

UK-based hotel booking website HotelHippo has been taken offline after a casual examination by security expert uncovered an extraordinary catalogue of security problems including leaking customer data to the Internet.

read more...

AlienVault expands OTX crowdsourced threat system with rogue traffic detection

Security firm AlienVault has added a new feature to its Open Threat Exchange (OTX) crowdsourced intelligence-sharing system which allows organisations to monitor their networks for rogue traffic entering or leaving.

read more...

Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map