Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

John E Dunn


John is one of the co-founders of Techworld, following a spell working for Tornado Insider, the European magazine for tech start-ups. He started in IT journalism as technical editor of Personal Computer Magazine, before progressing to become editor of Network World (formerly LAN Magazine) and Network Week before helping to set up Techworld Insider. He has also freelanced for a number of technical publications in the technology, science and business fields.

His Techworld blog is War on Error

RSS Subscribe to John E Dunn's RSS Feed

Email Contact John E Dunn

Email John E Dunn on Twitter

Email John E Dunn on LinkedIn

All articles by John E Dunn

Paying security researchers risks breeding bad attitude, says UK bounty hunter

The booming rewards on offer to researchers hunting software security flaws risks breeding a culture of entitlement, according to one of the UK’s most successful bug hunters of recent times, James Forshaw of pen-testing firm Context Information Security.


Imperva grabs cloud security with Incapsula and Skyfence buy-ins

Security vendor Imperva has gone on a mini spending spree, buying out web application firewall subsidiary Incapsula, cloud security firm Skyfence and bringing in-house small US OEM partner Tomium Software.


Cryptolocker scrambles US law firm's entire cache of legal files

A small US law firm has bravely admitted losing its entire cache of legal documents to the Cryptolocker Trojan despite attempting to pay the $300 (£180) ransom in a bid to have them unscrambled.


India investigates alleged Huawei 'hacking' of mobile base station

Chinese equipment maker Huawei is reportedly being investigated by the Indian Government over alleged ‘hacking’ of equipment belonging to state-run telecoms firm Bharat Sanchar Nigam Ltd (BSNL).


Target breach abused network access given to air conditioning firm

The third-party contractor whose credentials were used to plant malware on Target’s point-of-sale systems in November's huge data breach was an air-conditioning contractor that had been granted an unusual level of networks access, researcher Brian Krebs has reported.


Cyberattack and data loss preoccupies UK SMEs despite rise in confidence

British SMEs have grown increasingly concerned about technological disruption to their businesses with cybersecurity and data loss now rated as two of the three biggest worries, according to Zurich Insurance Group’s quarterly SME Risk Index.


Is Google's Play full of adware or not? It might depend which malware scanner you run

Is Google’s Android Play Store full of adware and malware or isn’t it? According to HP’s latest Cyber Risk Report, it all depends which firm’s mobile antivirus scanner you run.


US school expels pupils for using hardware keyloggers to change grades

A Californian school has expelled 11 pupils after uncovering a plot in which a private tutor allegedly directed them to change their grades on teachers’ PCs by breaking into them using credential-stealing hardware keyloggers.


Malwarebytes to charge $24.95 annual fee for Pro version of anti-malware scanner

Malwarebytes is to start charging $24.95 (£15) per annum for the Pro version of its popular and well-regarded malware detection and clean-up program, ending a period during which the same deal bought a lifetime license.


Patching times improved in 2013 as vulnerability battle goes on

Software vendors have improved their response to security flaws in the last 12 months but some still take too long to patch the highest-risk vulnerabilities, figures from Swiss penetration testing firm High-Tech Bridge have suggested.


UK Government tries whitelisting system to stop ISP 'pornwall' false positives

Stung by criticism that ISPs have been blocking legitimate websites as part of 'Cameron's pornwall', a working group is drawing up a whitelist of exceptions for use by the industry, it has emerged.


An employee clicked on a phishing link - should they be punished?

Everyone agrees that employees who unthinkingly click on email links and attachments pose a security risk. But should they be punished for making a bad click?


Symantec's results show firm battling changing security market

With sales of security software predicted to rise this year by Gartner, one of the top security software houses, Symantec, appears to be struggling in the very market it should be dominating.


Criminals use Java to infect Linux and Mac users with DDoS bot

Criminals are once again using Java’s cross-platform design to add Linux and Mac users to their usual Windows target list, Kaspersky Lab’s researchers have discovered.


SpyEye bank Trojan creator Aleksandr Panin faces 30 years in jail

The Russian man who created the SpyEye Trojan used to attack countless millions of online bank accounts has pleaded guilty to conspiracy charges in an Atlanta court room.


Data centres now 'magnets' for DDoS attacks, says Arbor report

Data centres have become “magnets” for DDoS attacks with many recording a marked rise in incidents during 2013, Arbor Networks’ latest Worldwide Infrastructure Security Report has found.


Coca-Cola suffers data breach after employee 'borrows' 55 laptops

Coca-Cola has admitted falling prey to bizarre slow-motion data breach in which an employee apparently stole dozens of laptops over several years containing the sensitive data of 74,000 people without anyone noticing.


Microsoft admits email hack as Syrian Electronic Army gloats

Microsoft has taken the unusual step of admitting that attackers - many suspect the Syrian Electronic Army (SEA) - have successfully breached its security and gained access to access to “law enforcement” documents held by some of its employees.


NSA happy to conduct industrial espionage on foreign firms, alleges Snowden

The National Security Agency (NSA) would happily carry out industrial espionage operations in pursuit of US economic interests, Edward Snowden has alleged in a German TV interview.


Alternative Networks buys ControlCircle for cloud services mojo

UK cloud services firm ControlCircle has been bought by AIM-listed telecoms provider Alternative Networks for £39.4 million ($64 million) in cash, the firms have announced.


Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map