John E. Dunn

John Dunn has been covering the IT industry for more than 30 years, specializing in cybersecurity, mobile, cloud, privacy, and networking. His work has appeared in numerous tech titles, including Computerworld, PC World, The Register, Which Computing, Forbes, and Naked Security. In 2003, he co-founded IDG's Techworld.
Recent posts by John E. Dunn

As every organization affected by ransomware eventually understands, the disruption caused by an attack is only the beginning of its problems. Next comes paying a lot of big bills. The first is the ransom demand, although at least that’s optional. Beyond that lie unavoidable costs such as loss of business, hiring an expensive forensics company […]

By anyone’s standards, $10 million is a lot of money, more than the average citizen will spend or earn in a lifetime of work. How many ways might someone become the recipient of such a large sum? A lottery win perhaps, although that’s statistically unlikely. An inheritance? More imaginable but still improbable. And yet there […]

Until early June, it’s likely that the only people who’d heard of Progress Software’s MOVEit file transfer platform were people working in IT departments. Then news emerged that the platform and many of its large customer base had been successfully targeted by the Clop ransomware group and suddenly everyone had heard of it for the […]

On May 17, the city of Augusta, Georgia, published a public information tweet of a type that’s becoming increasingly familiar to citizens across the United States: “The City is currently experiencing a disruption in network services, which may affect telephone and email access. We are working diligently to resolve the issue as soon as possible. […]

In cybersecurity circles, there’s a threat that’s sufficiently feared in which examples of it have on occasion acquired the status of professional legends—the possibility of a lone, rogue administrator running amok against their employer. For years, stories of rogue admins concerned internal incidents known only within an individual organization. Then the Internet arrived. This not […]

An odd characteristic of cybercrime is that it’s almost always disembodied. Crimes are perpetrated by someone out there but precisely who is only rarely made clear. This mystery can confuse victims. The history of crime is a long one but until recently it was a much more human-to-human affair, conducted in person. This didn’t make […]