Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

John E Dunn


John is one of the co-founders of Techworld, following a spell working for Tornado Insider, the European magazine for tech start-ups. He started in IT journalism as technical editor of Personal Computer Magazine, before progressing to become editor of Network World (formerly LAN Magazine) and Network Week before helping to set up Techworld Insider. He has also freelanced for a number of technical publications in the technology, science and business fields.

His Techworld blog is War on Error

RSS Subscribe to John E Dunn's RSS Feed

Email Contact John E Dunn

Email John E Dunn on Twitter

Email John E Dunn on LinkedIn

All articles by John E Dunn

Phishing messages fall markedly in 2013 despite better targetting

Criminals are sending markedly fewer phishing emails than a year ago but they are now being more skilfully targeted, an end-of-year report by security firm Websense has found.


Gmail image handling change criticised for privacy implications

Google’s decision to change the default setting for Gmail to show images by default has been criticised by security researchers as opening the door to sophisticated forms of message tracking.


Final member of £1.5 million 'student loan' phishing gang gets prison

The final member of a Manchester-based phishing gang that stole £1.5 million ($2.5 million) from UK students by setting up a bogus facsimile of the UK Student Loans Company (SLC) has been sentenced to three years and nine months in prison.


Cybercriminals clone pirate versions of top Android and iOS apps

Cybercriminals are using third-party app sites to peddle reverse-engineered or ‘pirate’ versions of almost all the most popular paid apps available on the Google Play and Apple App Stores, software firm Arxan has discovered.


Typosquatters and fraudsters still exploiting antivirus brands, analysis finds

More than a decade after typosquatting became an Internet hazard, criminals and opportunists are still abusing mis-spelled domains on a scale that is leaving users and businesses out of pocket, consultancy High-Tech Bridge has found.


Government to impose cyber-security 'baseline' on all suppliers, progress report reveals

The UK government plans to impose a "baseline" level of security competence on its suppliers through a new cyber-security standard that will eventually become mandatory for firms looking to win contracts.


Phishing gang suspected of £1 million theft found with hand grenade

British police have arrested four people suspected of being involved in a phishing attack in which £1 million ($1.6 million) was stolen from customers of two UK banks.


Quarter of UK consumers have experienced online account hacks, poll suggests

As many as a quarter of UK consumers have had online accounts compromised or online data stolen on at least one occasion with Hotmail (now and Facebook being the most commonly cited websites, a survey for authentication firm CertiVox has suggested.


Many organisations lack DDoS response plan, Corero finds

Many organisations have no formal plan for coping with DDoS attacks, lack up to date network maps, and probably depend on old technology to defend against the threat, a survey by Corero Network Security has suggested.


Infoblox invents new DNS server that can repel DDoS attacks

Network firm Infoblox thinks it has come up with a novel way to defend data centre DNS servers from DDoS attacks: combine the two functions in a single appliance.


Blackhole Exploit Kit creator 'Paunch' in custody, Russian police confirm

The first photograph shows a slightly overweight young man standing in front of a white Porsche Cayenne, cigarette in hand, expression uneasy. In a second he appears to be reading a charge sheet as a masked military policeman in black stands guard in the background.


Cybercriminals have access to 100 zero-day flaws on any day, NSS Labs calculates

On any given day cybercriminals and nation states are in possession of as many as 100 zero-day software exploits known only to them, NSS Labs has calculated using the commercial vulnerability market as a baseline.


Data breaches have eroded consumer faith in security, Fujitsu finds

A decade of data breaches has left barely one in ten UK consumers with faith in the ability of large organisations to safeguard their personal data, a survey for Fujitsu has revealed.


Government organisations still open to attack using USB sticks, finds Kaspersky Lab

Getting infected USB sticks inside large firms and government organisations would be child’s play for determined cybercriminals, Kaspersky Lab has found after one of its researchers successfully persuaded staff at several to open a PDF file during a staged visit.


USB wizards offer new Type-C connector to solve plug headache

The magic circle of USB wizards has finally decided to wave their wands at one of the interface’s most baffling annoyances - which way round should the cable connector be when plugging it in?


Death threats fly as $100 million of Bitcoins disappear from Sheep Marketplace

First came the closure of criminal underground Silk Road, now an apparently vast theft of Bitcoins from one of the sites that replaced it, Sheep Marketplace. Are the users of darkweb markets now being targeted by criminals?


Bitcoin mining function embedded inside rogue EULAs, Malwarebytes warns

The booming Bitcoin price is driving rogue software firms to embed mining functions inside apparently innocent tools that come with End User Licence Agreements (EULAs) legitimising the behaviour, security firm Malwarebytes has warned.


Akamai nabs Prolexic Technologies for $370 million

Internet firm Akamai has decided to expand its anti-DDoS services by buying security stalwart Prolexic Technologies for $370 million in cash (£230 million), the pair have announced.


Windows XP zero day gives attackers a way around Adobe Sandbox

A new zero day flaw in Windows XP and Server 2003 is being exploited in the wild to bypass the sandbox on unpatched versions of Adobe Reader, security firm FireEye has reported.


European Parliament cuts Wi-Fi after French researcher breaks into email accounts

The European Parliament has cut access to its public Wi-Fi network after detecting a man-in-the-middle attack on a number of email accounts apparently carried out by a white hat researcher out to expose poor security at the institution.


Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map