Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

John E. Dunn


John is one of the co-founders of Techworld, following a spell working for Tornado Insider, the European magazine for tech start-ups. He started in IT journalism as technical editor of Personal Computer Magazine, before progressing to become editor of Network World (formerly LAN Magazine) and Network Week before helping to set up Techworld Insider. He has also freelanced for a number of technical publications in the technology, science and business fields.

His Techworld blog is War on Error

RSS Subscribe to John E. Dunn's RSS Feed

Email Contact John E. Dunn

Email John E. Dunn on Twitter

Email John E. Dunn on LinkedIn

All articles by John E. Dunn

'Snowden effect' has changed cloud data security assumption, survey claims

Edward Snowden’s revelations of sophisticated NSA spying have made many senior IT staff distinctly edgy about their use of the cloud with nine out of teen now paying close attention to the location of stored data, a survey of global attitudes has found.


Open source trounces proprietary software for code defects, Coverity analysis finds

Forget bad headlines generated by the Heartbleed flaw, when it comes to code defects open source is still well ahead of proprietary software, generating fewer coding defects for every size of project, according to a new analysis by scanning service Coverity.


Bruce Schneier's Co3 Systems startup launches in UK and Europe

Enterprises have tools to help them manage every part of the IT chain so why not the complex aftermath of security and data breaches?


Mumsnet falls to Heartbleed hackers as 1.5 million users reset passwords

The Heartbleed flaw has claimed its first big-name victim with the hugely popular British Mumsnet site admitting that cyber-thieves have exploited the bug to compromise an unknown number of if its 1.5 million user accounts.


Phishing domains at record levels as criminals target Chinese consumers, says APWG

The number of domains registered to carry out phishing attacks broke all records in the second half of 2013 and yet a huge proportion of this type of fraud can now be explained by a single country, China.


Infosec teaching boost as security body (ISC)2 launches education programme

Security organisation (ISC)² has announced a new Global Academic Programme it hopes will boost the importance of security in higher education teaching programmes around the world.


HMIC slates police forces for ignoring cybercrime and cyberdefence

Many police forces in England and Wales are behaving as if cybercrime and cyberdefence are not part of their remit, lacking detailed strategies to prevent, detect or react to it, a stinging report from inspection body Her Majesty's Inspectorate of Constabulary (HMIC) has found.


Google's Chromebooks get Citrix XenApp business makeover

Google has underlined its ambition to draw more enterprises to the budding Chromebook platform by announcing a tie-up with Citrix to access Windows applications through the latter’s XenApp delivery system.


ZoneAlarm 2015 adds cloud scanning of email attachments BEFORE they open

Check Point has announced the new version of its popular ZoneAlarm antivirus program which features a cloud sandbox technology designed to check email attachments for malware before they are opened.


World hit by record wave of 'mega' data breaches in 2013, says Symantec

What do Target, AOL, LivingSocial, Evernote, and Adobe have in common with one another? Answer: they were all victims of huge data breaches during 2013, part of a phenomenon that a new Symantec report calcuates has reached epidemic levels.


NSS Labs fires back at FireEye as security test controversy burns anew

Security testing firm NSS Labs has publically defended itself against furious accusations by security firm FireEye that a cool assessment of the security vendor's breach detection technology published last week was based on a flawed methodology.


Windows XP only the latest example of risky software, argues KPMG

The fact that millions of PCs and embedded systems will continue to run Windows XP beyond this week’s End of Life (EOL) deadline is only the latest example of obsolete, risky software that shouldn’t be used to stoke up unnecessary fear, KPMG analyst Stephen Bonner has argued.


Android social apps slated for sending 'growth hacking' spam

Mobile security firm AdaptiveMobile has named and shamed a clutch of popular Android apps it believes have been using the ‘growth hacking’ technique to spam large volumes of invitations to the contacts database of installed users.


Are Google's Chromebooks a sales hit? So far, the analysts can't say

Google shifted a paltry 2.1 million Chromebooks in 2013, a figure that could still grow to 11 million per annum by 2019, new figures from US outfit ABI Research have predicted.


DDoS fear as 24 million home routers fuel hidden DNS amplification attacks

The spate of huge DNS DDoS amplification attacks of the last year probably had a previously undetected helping hand from millions of poorly-configured home routers, ISP security outfit Nominum has discovered.

read more... still silent after mystery 158,000 database breach of forum users

The hacking Vikings have hit Samsung-owned web TV sharing service, reportedly pillaging a 158,000 user database of forum users later posted to a Tor Internet site and at least one researcher.


Windows XP - why Microsoft will continue to patch the zombie OS

Officially, Microsoft casts off Windows XP next week. In all probability it will have to continue patching it whether it whether it likes this prospect or not. You have to hand it to Windows XP, an operating system that seems immune to age,...


What are Advanced Evasion Techniques? Don't expect CIOs to know, says McAfee

What are Advanced Evasion Techniques (AETs)? According to a McAfee survey, an awful lot of CIOs have absolutely no idea, confusing them with the more famous Advanced Persistent Threats (APTs) that have become an established term on many large organisations' worry list.


CERT-UK launched by Francis Maude to battle cyberattack threat

Britain’s brand new Computer Emergency Response Team (CERT-UK) has finally been launched, the latest and most high-profile part of the Government’s long-running overhaul of UK cyber-defences.


Google cracks whip to stop Android Play store apps abusing users

Google has once again tightened restrictions on the acceptable behaviour of Android apps distributed through the Play store, narrowing promotional design, forcing in-app payments to be made clearer, and widening the definition of spyware to catch abuse.


Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map