521 Posts

Douglas Bonderud

Freelance Writer

A freelance writer for three years, Doug Bonderud is a Western Canadian with expertise in the fields of technology and innovation. In addition to working for the IBM Midsize Insider, The Content Standard and Proteomics programs for Skyword, Doug also writes for companies like Ephricon Web Marketing and sites such as MSDynamicsWorld. Clients are impressed with not only his command of language but the minimal need for editing necessary in his pieces. His ability to create readable, relatable articles from diverse Web content is second to none. He has also written a weekly column for TORWars, a videogaming website; posts about invention and design for InventorSpot.com and general knowledge articles for WiseGeek. From 2010-2012, Doug did copywriting for eCopywriters.com. Doug is currently a municipal police officer, on track to become a fantasy/sci-fi author.

Written By Douglas Bonderud

New Macro Downloaders Use PUB Files to Compromise Food and Retail Companies

New macro downloaders are sandwiching spam and .PUB files to compromise businesses in the food and retail sector.

Fake Voice Apps Emerge in Google Play Store

Researchers spotted a new set of fake voice apps in the Google Play Store and suggested that the activity may signal the beginning of a new mobile botnet.

Brand New Bag? TrickBot Malware Adds POS Data Collection Module

Security researchers observed TrickBot malware that utilizes a new capability: point-of-sale (POS) data collection.

Retail Security Hygiene: The Case for Seasonal Checkups

Retail companies should conduct security hygiene checkups as early as possible this holiday season to identify key threats across e-commerce systems, seasonal staffing policies and employee behaviors.

Cyber Monday 2018: 5 Best Practices to Protect Consumer Data

Cyber Monday 2018 is just around the corner, and customers and malicious actors alike are gearing up. Is your retail security ready to tackle e-commerce fraud and improve consumer data protection?

Soft Skills, Solid Benefits: Cybersecurity Staffing Shifts Gears to Bring in New Skill Sets

It's time to prioritize soft skills, re-evaluate recruitment practices and prepare for a future where the hard skills of AI-enhanced tools require a soft-side balance to drive cybersecurity success.

Threat Actors Exploit Equation Editor to Distribute Hawkeye Keylogger

A recent Hawkeye keylogger campaign leveraged an old Microsoft Office Equation Editor vulnerability to steal user credentials, passwords and clipboard content.

NARWHAL SPIDER Uses Steganography to Deliver URLZone Malware in Cutwail Spam Campaign

A new Cutwail spam campaign is leveraging steganography — hiding data within images — to compromise devices and download URLZone.

Lock and sLoad: PowerShell Malware Downloader Geofences Attacks for Maximum Impact

A PowerShell malware downloader known as sLoad uses geofencing, customized emails and device reconnaissance to identify high-value Trojan targets.

Artificial Intelligence, Real Concerns: Hype, Hope and the Hard Truth About AI

With a corporate culture that supports transparency and human agency, it's possible to maximize the existing benefits of artificial intelligence (AI) while laying the groundwork for the future of AI.