John E. Dunn

John Dunn has been covering the IT industry for more than 30 years, specializing in cybersecurity, mobile, cloud, privacy, and networking. His work has appeared in numerous tech titles, including Computerworld, PC World, The Register, Which Computing, Forbes, and Naked Security. In 2003, he co-founded IDG's Techworld.
Recent posts by John E. Dunn

The problem with using averages to project the damage caused by ransomware is that they tend to make us forget about the sizable number that fall outside this band. Downtime—how long it takes to recover from an attack—is an interesting case in point. Data company Statista estimates the average downtime after a ransomware attack against […]

How many organizations across the world were successfully breached by ransomware in the last 12 months? Normally, blogs such as this rely on guesstimates to answer such questions, but now the European Union Agency for Cybersecurity (ENISA) has helpfully crunched the evidence and come up with a very specific answer for the period between May […]

Something unexpected is happening to ransomware statistics: for the first time since anyone can remember, the volume of attacks seems to be dropping quarter-over-quarter.  The evidence for this phenomenon includes a report from security company SonicWall, which recorded 236.1 million global ransomware attempts in the first half of 2022, a 23% drop compared to the […]

The U.S. Justice Department has notched upĀ  a small but potentially significant victory against ransomware after announcing the recovery of a $500,000 cryptocurrency payment extorted from two healthcare providers. While the sum sounds modest, and recovering ransoms has become more common in the last year, it’s clear from the announcement that the incident holds larger […]

As anyone who works in cybersecurity will already know, North Korea has made a big investment in its cyberattack capability, with ransomware a feared specialty. For that reason, a warning last week from the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) regarding Maui ransomware attacks on the U.S. healthcare sector will have filled […]

One of the biggest internal debates facing ransomware recovery planners is whether to pay an extortion demand or fall back on a process of internal data recovery. Increasingly, however, victims who decide to pay face a second and potentially complex question: is it worth trying to retrieve a ransom after it has been paid? For […]