Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

John E Dunn

Biography

John is one of the co-founders of Techworld, following a spell working for Tornado Insider, the European magazine for tech start-ups. He started in IT journalism as technical editor of Personal Computer Magazine, before progressing to become editor of Network World (formerly LAN Magazine) and Network Week before helping to set up Techworld Insider. He has also freelanced for a number of technical publications in the technology, science and business fields.

His Techworld blog is War on Error


RSS Subscribe to John E Dunn's RSS Feed

Email Contact John E Dunn

Email John E Dunn on Twitter

Email John E Dunn on LinkedIn


All articles by John E Dunn

Phishing emails fool most employees. But is this their problem or email's?

More than a decade after phishing attacks became the standard way of getting around corporate defences, all but a tiny minority of employees still fall for this kind of email, a McAfee test of UK-based workers has found.

read more...

Linux servers turned into bots by 'IptabLes' and 'IptabLex' malware

A botnet that infects and exploits poorly-maintained Linux servers has been used to launch a spate of large DDoS attacks targeting DNS and other infrastructure, Akamai’s Prolexic division has warned.

read more...

AVG splashes $220 million on mobile services firm Location Labs

Security firm AVG has decided to splash $220 million (£135 million) on up-and-coming California-based mobile services firm Location Labs, the largest acquisition ever made by the European firm.

read more...

Apple iCloud backup quirk could have allowed hackers to access 'deleted' files

The hackers who broke into iCloud accounts could have accessed revealing images and data users believed had been deleted weeks or even months in the past, an eagle-eyed Check Point Software researcher has suggested.

read more...

'Harkonnen' espionage Trojan stole data from 300 European SMBs

Hundreds of UK-registered companies were used for more than a decade as fronts for a huge data-stealing cyber-espionage campaign that targeted 300 SMBs in Germany, Austria and Switzerland, Israeli security startup Cybertinel has claimed.

read more...

North Korea using foreign bases to launch cyberattacks, says HP

The Democratic People's Republic of North Korea (DPRK) is a country with almost no conventional Internet presence and yet it has among the most active cyberwarfare footprints of any nation on earth and appears obsessed with expanding its operations, HP has concluded after reviewing evidence from a range of third-party sources.

read more...

Allocacoc PowerCube - the humble powerstrip reinvented

Is it possible to review a simple power strip? Until we came across the marketing pitch for the Dutch-designed PowerCube family of products we’d have said not but the company behind, Allocacoc, it claims to have taken an everyday object nobody thinks twice about and improved it in subtle ways without dramatically increasing the price.

read more...

CryptoWall ransom Trojan has infected 625,000 systems, says Dell SecureWorks

Is ransom malware business on the wane at last? New figures from Dell SecureWorks suggest that the current market leader, CryptoWall, hasn’t been as profitable as the infamous CryptoLocker despite infecting more PCs and holding hostage a staggering 5.25 billion files.

read more...

Java, Flash and Reader still PC admins' biggest security headaches

Most admins already know that Java and Adobe’s Flash and Reader are the most vulnerable pieces of software on the average Windows PC. A new analysis from Heimdal Security suggests that while 2014 has been better than last year vendors and customers remains pretty snowed under by the number of vulnerabilities in these programs.

read more...

IEEE Center for Secure Design wants tech industry to stop 'doing dumb stuff'

Software is riddled with ‘dumb’ design flaws that undermine security and the IEEE and a clutch of big tech firms including Google, Twitter, HP, Intel and several universities have to decided launch a new organisation to do something about it.

read more...

Hackers summon 'CDRDos' attack against Australian data centre using supertool

On 2 August, apparently for the first time ever, a hacking group coordinated a number of different reflection-style DDoS attacks against a single data centre, the mitigation firm involved, NSFOCUS, has confirmed.

read more...

Carbon Grabber campaign hunts for automotive industry logins

Europe’s automotive supply chain is being targeted by a malware campaign connected to the increasingly popular Carbon Grabber crimeware kit, researchers at Symantec have warned.

read more...

NSA and GCHQ moles feeding Tor Project with bug reports, claims executive director

The wizards of Tor are being fed bug reports by anonymous sources inside the agencies normally seen as trying to break its security, the NSA and GCHQ, the Project’s executive director Andrew Lewman has claimed in a BBC interview.

read more...

Spammers top spoofing targets are still finance and travel industries

The travel industry and large banks were the US industries most abused by spam and malicious email in the second quarter of 2014, according to Agari’s Email TrustIndex.

read more...

What happened to the Flashback Trojan? Turns out US universities are still riddled with it

US universities are still battling surprisingly high levels of malware infection among their student populations, mainly old forms considered neutralised years ago such as the Mac Flashback Trojan and Conficker worm, according to security firm BitSight Technologies.

read more...

Mystery TorrentLocker ransomware targets only Australian victims

Could the Russian ransomware masters hiding in their Eurasian fastness have an unlikely Australian malware rival?

read more...

HP's Stream laptop shows how confused Microsoft is about cloud computing

Plausible anti-Chromebook fightback or Microsoft throwing oranges at a gorilla? HP has called it the Stream and it’s the first model of what Microsoft hopes will grow into a low-cost notebook niche to take on the Chromebooks that have,...

read more...

Spam industry reinvented as messages containing malicious links surge

Spam might no longer be the gigantic overhead it once was but the number of unsolicited messages containing malicious links appears to be surging, according to figures from SaaS security firm ProofPoint.

read more...

Former employees have become 'application menace' new study claims

Many SME employees retain alarming levels of access to critical business applications after they've stopped working for a company, a survey for cloud services firm Intermedia has claimed.

read more...

Data breaches compromise seven million UK credit and debit cards since 2011, says Worldpay

Data breaches have compromised nearly seven million UK credit and debit cards over the last three years, with breached businesses each paying out almost a million in forensic and remediation costs, payments processor Worldpay has calculated.

read more...

Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map