371 Posts

Douglas Bonderud

Freelance Writer

A freelance writer for three years, Doug Bonderud is a Western Canadian with expertise in the fields of technology and innovation. In addition to working for the IBM Midsize Insider, The Content Standard and Proteomics programs for Skyword, Doug also writes for companies like Ephricon Web Marketing and sites such as MSDynamicsWorld. Clients are impressed with not only his command of language but the minimal need for editing necessary in his pieces. His ability to create readable, relatable articles from diverse Web content is second to none. He has also written a weekly column for TORWars, a videogaming website; posts about invention and design for InventorSpot.com and general knowledge articles for WiseGeek. From 2010-2012, Doug did copywriting for eCopywriters.com. Doug is currently a municipal police officer, on track to become a fantasy/sci-fi author.

Written By Douglas Bonderud

Files With That? Ransomware-as-a-Service Lets Would-Be Fraudsters Order on Demand

Ransomware-as-a-service empowers cybercriminals to order up infections on-demand. Is this the future of digital attacks?

Digital Privacy: The Value of Lies?

Is digital privacy a right or a privilege? That's the most recent raging debate among consumers, and it could spur a new era of digital misinformation.

Magneto Vulnerability: Cybercriminals Drawn to E-commerce Exploit

A newly released Magneto vulnerability comes with serious risk of total e-commerce compromise. Here's what businesses and shoppers need to know.

Automation Advancement: The Road to Emergent Security AI?

Emergent security AI offers the potential for real-time threat detection and defense — what's the role of automation in this infosecurity endgame?

Brick House? New Malware Destroys Vulnerable IoT Devices

Iot devices are now under threat from a new strain of malware. BrickerBot infects vulnerable Linus-based endpoints and makes them permanently unusable.

Massive Margins: DDoS Attack Profit Rates Hit 95 Percent

A distributed DDoS attack can now net fraudsters revenue that any private company would envy: Done right, attackers can reach 95 percent profit margins.

Wipeout? Subpar Secondhand Mobile Device Security Leaves PII Exposed

Secondhand mobile device security is a struggle for many, according to new research. Data found that 40 percent of reused devices still contain old PII.

It’s a Wild, Wild Word: New Macro Malware Now Infecting Both Windows and MacOS

New brands of macro malware are doubling down on Windows and MacOS operating systems. Here's a look at the newest Word-based attack.

Burgenoning Bug Bounty Programs Up the Ante

Bug bounty programs are now paying out more to white-hat hackers, but they're also tightening regulations on payments and structure.

New POS Malware Leverages Modular Sleight of Hand to Exfiltrate Card Data

Time for a show? New POS malware MajikPOS uses modular sleight-of-hand tricks and a variety of methods to gain system access for credit card info access.