491 Posts

Douglas Bonderud

Freelance Writer

A freelance writer for three years, Doug Bonderud is a Western Canadian with expertise in the fields of technology and innovation. In addition to working for the IBM Midsize Insider, The Content Standard and Proteomics programs for Skyword, Doug also writes for companies like Ephricon Web Marketing and sites such as MSDynamicsWorld. Clients are impressed with not only his command of language but the minimal need for editing necessary in his pieces. His ability to create readable, relatable articles from diverse Web content is second to none. He has also written a weekly column for TORWars, a videogaming website; posts about invention and design for InventorSpot.com and general knowledge articles for WiseGeek. From 2010-2012, Doug did copywriting for eCopywriters.com. Doug is currently a municipal police officer, on track to become a fantasy/sci-fi author.

Written By Douglas Bonderud

XSS Vulnerability Crossed Out in New WordPress Version

WordPress update 4.2.3 crossed out a critical XSS vulnerability — the latest in a long line of flaws that put websites running the CMS at risk.

Break a Leg? New Android Vulnerability Takes Center Stage

Native app StageFright is the newest Android vulnerability to come to light. How can users protect their mobile devices from the onslaught of threats?

Bot Blacklist: Tech Heavyweights Look to Block the Bad Guys

The Trustworthy Accountability Group (TAG) is creating a bot blacklist in collaboration with Google, Facebook and Yahoo. Can they win the war on ad fraud?

GamaPOS Malware Extends Reach With Andromeda Botnet

Point-of-sale malware GamaPOS is looking for greater reach by leveraging the popular Andromeda botnet. But what's the risk factor?

Breaking Up, Breaking In? Sensitive Data and the Ex-Employee

Ex-employees aren't always cut off from corporate networks. How do companies ensure sensitive data is protected when users leave the fold?

TeslaCrypt Levels Up Encryption With Version 2.0.0

TeslaCrypt is back, this time with better encryption and a re-skin to make it look like part of CryptoWall. What's worth knowing about Version 2.0.0?

Butterfly Effect: Chaos Reigns, From Morpho to Wild Neutron

Malware group Butterfly — once called Morpho and Wild Neuton — is after corporate IP. What are the risk factors, and how can companies protect their data?

When the Canary Stops: New Bitcoin Mining Hack a Wake-Up Call?

A recent cyberattack on a bitcoin mining site has many users wondering: Has the canary sung its final song? Could this be the end of the currency?

DEF CON Vs. Black Hat: Your Best Bet for Vegas 2015

The DEF CON, Black Hat and BSides conferences all descend on Las Vegas this August. But which of these gatherings is the best bet for you?

Windows 10 Wi-Fi Sharing: Feature or Flaw?

Windows 10 Wi-Fi sharing raises worrisome security questions for users who are hesitant to embrace network sharing: Is it better to share or opt out?