Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

John E. Dunn


John is one of the co-founders of Techworld, following a spell working for Tornado Insider, the European magazine for tech start-ups. He started in IT journalism as technical editor of Personal Computer Magazine, before progressing to become editor of Network World (formerly LAN Magazine) and Network Week before helping to set up Techworld Insider. He has also freelanced for a number of technical publications in the technology, science and business fields.

His Techworld blog is War on Error

RSS Subscribe to John E. Dunn's RSS Feed

Email Contact John E. Dunn

Email John E. Dunn on Twitter

Email John E. Dunn on LinkedIn

All articles by John E. Dunn

Magnitude exploit kit changes tack to make money from CryptoWall ransomware

The Russian Magnitude malware exploit kit has moved on to the territory vacated by the defunct Blackhole Exploit Kit after successfully developing a new and highly profitable business model, according to security firm Trustwave.


London is laptop, smartphone and tablet theft capital of UK, police figures confirm

Four out of ten electronic devices reported stolen in the UK last year belonged to people living or working in London, a Freedom of Information analysis by security firm ViaSat UK has found.


Gemalto pounces on SafeNet for cloud encryption and authentication

European smartcard security vendor Gemalto has announced a deal to buy US cloud and encryption management vendor SafeNet for $890 million (£530 million).


Yahoo ad system used to push CryptoWall ransom 'malvertising'

The world has come to fear the effects of ransom malware but how does it get near the PCs of its victims in the first place?


SynoLocker NAS ransomware - was February 'PWNED' attack a warning of trouble?

SynoLocker was not the first malware to target a serious software vulnerability in DiskStation software Could the unprecedented attack on users of Synology’s DiskStation NAS storage drives by ransom malware have been stopped before it...


CryptoLocker victims offered free decryption tool to get back scrambled files

At last, hope for victims of the CryptoLocker ransom Trojan who believed they would never see their scrambled files again: security firms FireEye and Fox-IT have set up a free website that can be used to retrieve encryption keys for individual files.


Russian 'CyberVors' gang has stolen 1.2 billion logins and counting, says US security firm

A Russian gang dubbed ‘CyberVors’ has amassed an astonishing 1.2 billion unique web credentials stolen from 420,000 different web and FTP sites, US security firm Hold Security has reported after researching the vast scale of Internet data theft over a period of months.


Verdasys renames itself in honour of endpoint security product Digital Guardian

Endpoint security firm Verdasys has renamed and re-launched itself as Digital Guardian in honour of its flagship software product, the company has announced.


Synology users told to update DiskStation NAS drives after 'SynoLocker' ransom attack

Users of Synology’s market-leading DiskStation NAS drives are being urged to update their drive’s management software immediately after what appears to be an unprecedented targeted attack by CryptoLocker-like ransom malware.


UK card fraud beats all records as expert predicts more annoying phone checks

UK card fraud reached record levels in 2013 which means that consumers should prepare for more real-time transaction checks when buying goods, a fraud expert has predicted.


Symantec and Kaspersky Lab antivirus software kicked off Chinese Government approved list

Symantec and Kaspersky Lab have become the latest tech firms to be kicked off the Chinese Government’s approved list, according to an unconfirmed report in the country’s media.


CryptoWall ransom attacks net huge haul of Bitcoins from victims

The criminal gang behind the CryptoWall extortion malware has recently raked in a haul of Bitcoins worth hundreds of thousands of dollars from its unknown victims, security firm PhishMe has revealed.


Paddy Power condemned after waiting FOUR YEARS to tell 650,000 customers of data breach

Popular gambling site Paddy Power has been heavily criticised after taking an incredible four years to tell 650,000 customers that their personal data has been compromised in a data breach dating back to 2010.


PCI regime has bred complacent tick-box security among retailers, Tripwire survey finds

Retail and financial services organisations have become over-reliant on high-level compliance regimes such as PCI DSS to shore up their networks against data breaches, a survey of 400 UK and US organisations by security firm Tripwire has suggested.


Tor points finger at US researchers after possible compromise of service

In a year, Tor has turned from a celebrated global anonymity service into a full-scale privacy battleground, under attack from suspicious Feds, abused by criminals while earlier this week we learned that even the Russian Government hates it.


Police warnings to appear on websites suspected of copyright abuse

UK visitors to websites suspected of pirating content will from this week be served banners warning them of the site’s suspect status, the Police Intellectual Property Crime Unit (PIPCU) has announced.


Defunct Koler ransom Trojan attacked 200,000 Android users in matter of weeks

The crude Koler.a ‘police ransom’ Trojan that started attacking Android smartphone users in April has finally been knocked out of action by researchers but only after revealing the disturbing if brief scale of its global success.


Is the WEDG the answer to post-Snowden data paranoia? Its inventor remains hopeful

The British entrepreneur behind the innovative WEDG secure storage box for the ‘post-Snowden era’ has told Techworld he remains upbeat about its chances despite still being some way short of the £90,000 ($150,000) set for the project on Kickstarter.


Mystery 'Onion/Critroni' ransom Trojan evolves to use more sophisticated encryption

Kaspersky Lab has added more detail on the fiendish ‘Onion’ (aka 'Critroni') ransom Trojan that uses the Tor anonymity service to hide its command and control (C&C) as well as displaying a level of thoughtfulness about its encryption design that bodes ill for future attacks.


Nigerian 419 scammers diversifying into Trojan malware, finds Palo Alto

A Nigerian cybercrime gang versed in 419 social engineering scams has diversified into using off-the-shelf RAT tools to attacks Taiwanese and South Korean businesses, according to researchers working for Palo Alto Networks.


Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map