Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

John E Dunn


John is one of the co-founders of Techworld, following a spell working for Tornado Insider, the European magazine for tech start-ups. He started in IT journalism as technical editor of Personal Computer Magazine, before progressing to become editor of Network World (formerly LAN Magazine) and Network Week before helping to set up Techworld Insider. He has also freelanced for a number of technical publications in the technology, science and business fields.

His Techworld blog is War on Error

RSS Subscribe to John E Dunn's RSS Feed

Email Contact John E Dunn

Email John E Dunn on Twitter

Email John E Dunn on LinkedIn

All articles by John E Dunn

Microsoft Office applications barely used by many employees, new study shows

Organisations are wasting money licensing Microsoft Office applications that the majority of employees barely use, a study released this week by application analytics startup SoftWatch has found. Conclusion: many users could easly be migrated to far cheaper cloud applications such as Google Apps.


TDL4 rootkit can be modified to pwn any security product, Bromium researchers discover

Kernel mode rootkits are more viable than has been realised and could be used to bypass more or less any security product in existence, researchers at Bromium have discovered after conducting a proof-of-concept attack using a modified variant of in the infamous TDL4 malware.


Barclays 'KVM heist' gang given long jail sentences for £1.3 million bank raid

Nine members of the gang that carried out last year’s innovative remote KVM attacks on Barclays Bank and Santander have been handed prison sentences totalling 24 years and nine months for a heist that netted £1.3 million ($2.2 million).


Risk of follow-up DDoS attack rises to one in three, Akamai report finds

Organisations have a roughly one in three chance of a follow-up DDoS attack after a first incident, Internet giant Akamai has calculated using figures from the final quarter of 2013. This was a significant spike compared to the rest of the year.


Criminals have noticed the cloud: attacks on providers on the rise

The number of cyberattacks directed at cloud infrastructure is still below that experienced by on-premises data centres but will probably reach parity at some point, an analysis by security-as-a-service provider Alert Logic has suggested.


Microsoft hints at cloud version of Windows with Chromebook Office connectors


SMS spam rises in UK as 'accident compensation' scammers get busy

The volume of SMS spam being sent to UK mobile users rose 11 percent in the first quarter of 2014 thanks mainly to a sudden spike in accident compensation scams, according to messaging security firm Cloudmark.


Data breaches can be traced back to nine attack 'patterns', says Verizon report

Almost every security incident and data breach recorded during 2013 can be traced back to a series of basic threat types or ‘patterns’, many of which are specific to industry sectors, Verizon’s bellwether 2014 Data Breach Investigations Report (DBIR) has concluded.


'Snowden effect' has changed cloud data security assumption, survey claims

Edward Snowden’s revelations of sophisticated NSA spying have made many senior IT staff distinctly edgy about their use of the cloud with nine out of teen now paying close attention to the location of stored data, a survey of global attitudes has found.


Open source trounces proprietary software for code defects, Coverity analysis finds

Forget bad headlines generated by the Heartbleed flaw, when it comes to code defects open source is still well ahead of proprietary software, generating fewer coding defects for every size of project, according to a new analysis by scanning service Coverity.


Bruce Schneier's Co3 Systems startup launches in UK and Europe

Enterprises have tools to help them manage every part of the IT chain so why not the complex aftermath of security and data breaches?


Mumsnet falls to Heartbleed hackers as 1.5 million users reset passwords

The Heartbleed flaw has claimed its first big-name victim with the hugely popular British Mumsnet site admitting that cyber-thieves have exploited the bug to compromise an unknown number of if its 1.5 million user accounts.


Phishing domains at record levels as criminals target Chinese consumers, says APWG

The number of domains registered to carry out phishing attacks broke all records in the second half of 2013 and yet a huge proportion of this type of fraud can now be explained by a single country, China.


Infosec teaching boost as security body (ISC)2 launches education programme

Security organisation (ISC)² has announced a new Global Academic Programme it hopes will boost the importance of security in higher education teaching programmes around the world.


HMIC slates police forces for ignoring cybercrime and cyberdefence

Many police forces in England and Wales are behaving as if cybercrime and cyberdefence are not part of their remit, lacking detailed strategies to prevent, detect or react to it, a stinging report from inspection body Her Majesty's Inspectorate of Constabulary (HMIC) has found.


Google's Chromebooks get Citrix XenApp business makeover

Google has underlined its ambition to draw more enterprises to the budding Chromebook platform by announcing a tie-up with Citrix to access Windows applications through the latter’s XenApp delivery system.


ZoneAlarm 2015 adds cloud scanning of email attachments BEFORE they open

Check Point has announced the new version of its popular ZoneAlarm antivirus program which features a cloud sandbox technology designed to check email attachments for malware before they are opened.


World hit by record wave of 'mega' data breaches in 2013, says Symantec

What do Target, AOL, LivingSocial, Evernote, and Adobe have in common with one another? Answer: they were all victims of huge data breaches during 2013, part of a phenomenon that a new Symantec report calcuates has reached epidemic levels.


NSS Labs fires back at FireEye as security test controversy burns anew

Security testing firm NSS Labs has publically defended itself against furious accusations by security firm FireEye that a cool assessment of the security vendor's breach detection technology published last week was based on a flawed methodology.


Windows XP only the latest example of risky software, argues KPMG

The fact that millions of PCs and embedded systems will continue to run Windows XP beyond this week’s End of Life (EOL) deadline is only the latest example of obsolete, risky software that shouldn’t be used to stoke up unnecessary fear, KPMG analyst Stephen Bonner has argued.


Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map