529 Posts

Douglas Bonderud

Freelance Writer

A freelance writer for three years, Doug Bonderud is a Western Canadian with expertise in the fields of technology and innovation. In addition to working for the IBM Midsize Insider, The Content Standard and Proteomics programs for Skyword, Doug also writes for companies like Ephricon Web Marketing and sites such as MSDynamicsWorld. Clients are impressed with not only his command of language but the minimal need for editing necessary in his pieces. His ability to create readable, relatable articles from diverse Web content is second to none. He has also written a weekly column for TORWars, a videogaming website; posts about invention and design for InventorSpot.com and general knowledge articles for WiseGeek. From 2010-2012, Doug did copywriting for eCopywriters.com. Doug is currently a municipal police officer, on track to become a fantasy/sci-fi author.

Written By Douglas Bonderud

Catastrophe, Not Compromise: VFEmail Attack Destroys Decades of Data

The email provider VFEmail suffered a "catastrophic" hack that destroyed the company's primary and backup data servers in the U.S.

10 Cybersecurity Conference Trips You Should Make Time for This Year

Not sure where to distribute IT budgets for ideal returns? Here's a roundup of the top 10 cybersecurity conference trips to make time for this year.

BBC Email Scam Spoofs Broadcaster’s Site to Generate Bitcoin

Researchers identified a new email scam using seemingly legitimate BBC News webpages to reroute user clicks and generate bitcoin.

New Reverse Proxy Tool Can Bypass Two-Factor Authentication and Automate Phishing Attacks

A new reverse proxy tool called Modlishka can easily automate phishing attacks and bypass two-factor authentication (2FA) — and it's available for download on GitHub.

NRSMiner Crypto-Mining Malware Infects Asian Devices With the Help of EternalBlue Exploit

Security researchers report that the newest version of NRSMiner crypto-mining malware is causing problems for companies that haven't patched the EternalBlue exploit.

Ursnif, Emotet, Dridex and BitPaymer Malware Families Team Up to Wreak Havoc

Researchers discovered a link between four malware families — Ursnif, Emotet, Dridex and BitPaymer — that suggests threat actors may be combining efforts to develop more sophisticated attack vectors.

The Gift That Keeps on Giving: PCI Compliance for Post-Holiday Season Returns

Holiday spending is on the rise both in-store and online. How can retailers ensure PCI compliance to manage large transaction volumes and post-holiday refunds?

What Can Your Enterprise Learn From the Worst Passwords of 2018?

Splash Data released its list of the worst passwords of 2018. How does your enterprise stack up, and what advice can you give users to help improve their password security hygiene in the new year?

New Macro Downloaders Use PUB Files to Compromise Food and Retail Companies

New macro downloaders are sandwiching spam and .PUB files to compromise businesses in the food and retail sector.

Fake Voice Apps Emerge in Google Play Store

Researchers spotted a new set of fake voice apps in the Google Play Store and suggested that the activity may signal the beginning of a new mobile botnet.