Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

John E Dunn

Biography

John is one of the co-founders of Techworld, following a spell working for Tornado Insider, the European magazine for tech start-ups. He started in IT journalism as technical editor of Personal Computer Magazine, before progressing to become editor of Network World (formerly LAN Magazine) and Network Week before helping to set up Techworld Insider. He has also freelanced for a number of technical publications in the technology, science and business fields.

His Techworld blog is War on Error


RSS Subscribe to John E Dunn's RSS Feed

Email Contact John E Dunn

Email John E Dunn on Twitter

Email John E Dunn on LinkedIn


All articles by John E Dunn

Chinese businessman used tech firm to hack US aircraft programmes, US alleges

A Chinese businessman used the cover of his aviation firm to steal data on US military aircraft programmes which was then hawked around companies in his home country, the US Department of Justice has alleged.

read more...

Windows XP users left high and dry as Oracle ends Java support

Windows XP hold-outs pay attention. If you run the Java runtime on XP, it looks as if the current version is about as good as it gets. The next version, 7u65 and 8u11, due to ship in the middle of July, will not support or run on XP.

read more...

Bolware payment malware swindles Brazilians out of staggering $3.75 billion, says RSA

Brazilians using the country’s Boleto Bancário money payment system could have been swindled out of as much as a staggering $3.75 billion (£2.2 billion) by a piece of malware called 'Bolware, according to a new analysis by security firm RSA Security.

read more...

MiniDuke state cyber-weapon re-used Russian 'Cosmu' Trojan, F-Secure says

Some versions of the mysterious MiniDuke malware discovered last year targeting European governments shared code with a Trojan tracing its origins back to the early years of the commercial Internet, a new analysis by Finnish firm F-Secure has found.

read more...

Expert slams HotelHippo booking website after finding multiple security woes

UK-based hotel booking website HotelHippo has been taken offline after a casual examination by security expert uncovered an extraordinary catalogue of security problems including leaking customer data to the Internet.

read more...

AlienVault expands OTX crowdsourced threat system with rogue traffic detection

Security firm AlienVault has added a new feature to its Open Threat Exchange (OTX) crowdsourced intelligence-sharing system which allows organisations to monitor their networks for rogue traffic entering or leaving.

read more...

US breach-o-rama continues as Butler University admits 163,000-person hack

Butler University in Indianapolis has told 163,000 staff and students including those connected to the institution in the past that a data breach dating back to 2013 could have compromised their personal details.

read more...

IT admins think antivirus is essential. The Australian Department of Defence begs to differ

IT staff consistently over-rate the importance of security technologies that a study for the Australian Department of Defence (ADoD) based on real-world attacks has assessed as being of much lower importance, according to security firm Avecto.

read more...

If Brian Krebs is this hated he must be doing some good

Journalists are supposed to report cybercrime. Now one of them is regularly on the receiving end. Security journalists are normally pretty much ignored by cyber-criminals but  campaigning security blogger Brian Krebs seems to have got under the...

read more...

UK teen arrested for Spamhaus DDoS attacks charged by police

The teen arrested last year in connection with the huge DNS reflection DDoS attack against anti-spam outfit Spamhaus has been charged, the National Crime Agency (NCA) has said.

read more...

US airports compromised during major APT hacking campaign, says CIS

APT hackers successful compromised the networks of two US airport networks in the summer of 2013 as part of a major campaign targeting dozens of others, a report from public sector security non-profit the Center for Internet Security (CIS) has revealed.

read more...

Italy's 'Hacking Team' spy Trojan targeting Android and iOS devices, researchers discover

Italy’s infamous and dubious hackers-for-hire Hacking Team (or HackingTeam) have set up a worldwide command and control network comprising several hundred servers and expanded into Android and iOS surveillance, a study by Kaspersky Lab and the University of Toronto’s Citizen Lab has revealed.

read more...

Credit and debit card fraud eating away at consumer confidence in providers

Credit and debit card fraud is starting to erode confidence in providers, with many consumers using cards less often or abandoning them altogether after fraud incidents, a global survey of 6,100 consumers by ACI Worldwide has reported.

read more...

NCC Group's new '.trust' domain promises Internet security overhaul

With a flood of new general top-level domains (gTLDs) reaching Internet users in 2014, security UK firm NCC Group and a clutch of large Internet brands have announced a new secure domain they hope will turn out to be the most significant of them all.

read more...

Syrian Electronic Army phishes Reuters ad partner to post political message

The Syrian Electronic Army (SEA) has followed up last week’s attacks on The Sunday Times by successfully if briefly hijacking content embedded by the Taboola ad network on Reuters’ news website.

read more...

The Syrian Electronic Army is quieter but still out there

Paradoxically, the SEA's attacks 'micro-hacks' against the Sunday Times and The Sun this week suggest that defences are improving So often bitten in the past, website owners appear to be getting to grips with once-feared Syrian Electronic Army...

read more...

Google Play analysis reveals security flaws in apps, say researchers

Researchers analysing Google’s Play Store apps using a specially-written ‘crawling’ tool uncovered serious security problems that would have allowed attackers to compromise social media and other accounts as well as steal the credentials used by developers running on Amazon’s Web Services (AWS).

read more...

UK's first cybersecurity fund C5 Capital pumps $8 million into promising Hungarian play BalaBit

The first UK-based fund investing purely in cybersecurity firms, C5 Capital, has launched its $125 million (£73 million) fund by investing in a promising Hungarian security unknown called BalaBit.

read more...

Chinese Star N9500 Android smartphone contains factory-installed Trojan, says security firm

The powerful but surprisingly cheap Chinese-made Android Star N9500 smartphone sold on a wide range of websites including Amazon UK and eBay is being used to distribute a dangerous factory-installed Trojan, German security firm G Data has alleged.

read more...

TowelRoot Android rooting tool presages malware exploits against kernel flaw, suggests security vendor

Is the Towelroot tool a simple way for Android smartphone users to gain root access on their devices or an inadvertent proof-of-concept that shows the way to cybercriminals?

read more...

Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map