Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

John E. Dunn

Biography

John is one of the co-founders of Techworld, following a spell working for Tornado Insider, the European magazine for tech start-ups. He started in IT journalism as technical editor of Personal Computer Magazine, before progressing to become editor of Network World (formerly LAN Magazine) and Network Week before helping to set up Techworld Insider. He has also freelanced for a number of technical publications in the technology, science and business fields.

His Techworld blog is War on Error


RSS Subscribe to John E. Dunn's RSS Feed

Email Contact John E. Dunn

Email John E. Dunn on Twitter

Email John E. Dunn on LinkedIn


All articles by John E. Dunn

Fear and confusion as iconic TrueCrypt security tool tells world to use BitLocker

Something decidedly odd has befallen the hugely popular and iconic TrueCrypt encryption utility used by security-aware users the world over to encrypt data with the plausible certainty that even the NSA geeks with pocket protectors won’t be able to break it.

read more...

US healthcare and pharmaceutical firms given lower security rating in new analysis

Cybersecurity among the largest US health and pharmaceutical organisations has fallen behind sectors such as finance, utilities and even retail, an analysis of S&P 500 firms has found.

read more...

Google calls time on third-party Chrome extensions to turn security screw

Google Chrome users on Windows can now only install browser extensions through the Web Store, the search giant has announced, fulfilling a long-standing promise to tighten security.

read more...

CryptoDefense ransom malware using Java drive-by exploit to boost infection rate

The gang behind the CryptoDefense ransom malware has been distributing it using a simple Java drive-by attack as a way of boosting the number of victims, security firm Bromium has confirmed after analysing a version that appeared in March.

read more...

Apple users hit by $100 ransom demand after mystery iCloud account breach

Apple iPhone, iPad and Mac users in Australia and New Zealand are being pestered by mysterious ransom messages demanding up to $100 in order to 'unlock' their devices. A hack of some iCloud user accounts is suspected.

read more...

Avast pulls support forum after hackers pwn 400,000 user accounts

Anti-virus firm Avast Software has taken its user support forum offline after hackers broke into the system at the weekend and compromised around 400,000 of its registered users.

read more...

F5 Networks pounces on fledgling anti-DDoS startup Defense.Net

Less than a year on from its launch, DDoS fledgling Defense.Net has been bought by F5 Networks for an undisclosed sum.

read more...

Antivirus software can't keep up with new malware, Lastline Labs analysis finds

Brand new malware is detected by only around half of antivirus programs on the day it first appears, an analysis by security startup Lastline Labs has found after running samples through the VirusTotal online scanner.

read more...

Cyberwar fact - China's PLA 61398 hackers enjoy a two-hour lunch break

The decision by the US to name names sets an intriguing but risky precedent The popular view of state cyberwar and espionage is that it has no name, no face and certainly doesn’t keep regular hours between nine to five. It’s almost as...

read more...

The eBay breach is part of a pattern - big brands can no longer protect their users

Megabrand eBay has fallen to the hackers - do the world’s most powerful brands know what they’re doing? Today eBay has set in motion what must be the largest password reset in Internet history after asking its entire user base of 230...

read more...

Check Point plots to disrupt threat intelligence market with new IntelliStore feeds

Security giant Check Point has launched a pioneering new market for real-time security threats it hopes will offer a way for smaller third-party security firms to embed their intelligence on cyberattacks and malware directly into the real-time filtering applied by the company’s security products.

read more...

Worried US retailers battle cyber-attacks through new intelligence-sharing body

Stung into action by a wave of devastating data breaches, US retailers have taken the historic decision to share data on cyber-threats for the first time through a new initiative, the Retail Cyber Intelligence Sharing Center (R-CISC).

read more...

Smartphone battery dead? UK startup launches world's first charge rental service

Tiny British startup SaveSquared has launched a service it believes can cure the affliction of smartphones and tablets that run out of power while out and about - power up the device by renting a portable recharger from a nearby shop.

read more...

Average US business fields 10,000 security alerts per day, Damballa analysis finds

The average North American enterprise fields around 10,000 alerts each day from its security systems, far more than their IT teams can possibly process, a Damballa analysis of Q1 2014 traffic has found.

read more...

NetClean forensic tool gives police way of analysing growing volume of image evidence

Image forensics firm NetClean Technologies has come up with a way to use its world-renowned child porn image-fingerprinting technology to help police document and investigate images and videos connected to a much wider range of crimes.

read more...

ICO turns teacher with hit-list of top data breach weaknesses

The Information Commissioner’s Office (ICO) is burnishing its credentials as a centre of best practice by publishing a hit-list of the top security weaknesses that are the root cause of many of the data breaches it investigates.

read more...

Is Windows 7 more vulnerable than XP? In fact 'Rotbrow' malware is a warning for all Windows users

According to Microsoft's SIR report, a single piece of malware raised Windows 7's infection rate above XP for the first time. But this tells us about the vulnerabulity of Windows as a platform and not just Windows 7. Does Windows 7 suddenly have...

read more...

FireEye finds another piece of its security jigsaw

As its stock heads south, once-loved startup digs in for the long term Its shares are starting to look like a dot.com after the bubble has popped but that isn’t stopping security firm FireEye from adding more headcount, throwing $70 million...

read more...

Reveton malware biggest ransom menace of 2013, Microsoft's SIR report finds

Cryptolocker ravaged computer users in late 2013 but it was still only the seventh most common form of ransom malware for the second half of the year, Microsoft’s latest Security Intelligence Report (SIR) has calculated using the firm's inhouse Windows user data.

read more...

Anti-virus pioneer Alan Solomon thinks anti-virus is dead. He uses Linux instead

Symantec has done a “Gerald Ratner”, quips Britain's other Doctor British anti-virus pioneer Dr Alan Solomon is so convinced that AV software no longer works that he gave up using it a “long time ago” and solved his...

read more...

Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map