529 Posts

Douglas Bonderud

Freelance Writer

A freelance writer for three years, Doug Bonderud is a Western Canadian with expertise in the fields of technology and innovation. In addition to working for the IBM Midsize Insider, The Content Standard and Proteomics programs for Skyword, Doug also writes for companies like Ephricon Web Marketing and sites such as MSDynamicsWorld. Clients are impressed with not only his command of language but the minimal need for editing necessary in his pieces. His ability to create readable, relatable articles from diverse Web content is second to none. He has also written a weekly column for TORWars, a videogaming website; posts about invention and design for InventorSpot.com and general knowledge articles for WiseGeek. From 2010-2012, Doug did copywriting for eCopywriters.com. Doug is currently a municipal police officer, on track to become a fantasy/sci-fi author.

Written By Douglas Bonderud

WhatsApp Web Client Hit With Business Card Blunder

The WhatsApp Web client is now vulnerable to a vCard-led attack, according to researchers. How can users patch the vulnerability and avoid the issue?

Image Issues: Google Play Apps Hit by CAPTCHA-Cheating Malware

A new type of Trojan has been sneaking into the Google Play store and could be infecting the mobile devices of unsuspecting users.

Self-Hacking: Corporations Start Thinking Like Criminals

Self-hacking may be the next big thing in IT security, but can thinking like cybercriminals really help professionals defend corporate networks?

App Encryption: Secure Locks or Little White Lies?

App encryption service AppLock is full of security holes, according to security researchers. How do users tell true locks from little white lies?

Getting Out: Data Exfiltration Gets Sophisticated

Data exfiltration techniques are getting more sophisticated. How do companies protect their interests against attackers who are willing to get creative?

Social Engineering and BEC Scams: Walking the Wire?

Social engineering has become commonplace in malware parlance. But now, cybercriminals are targeting executives in high-level wire transfer scams.

iOS Sandbox Vulnerability Threatens Enterprise MDM Castles

Once considered a bastion of mobile security, Apple has come under fire in recent months. Now, a new iOS sandbox vulnerability has emerged.

Chip-and-PIN Credit Cards: Five Best Practices for Secure, Compliant Infrastructure

The implementation of chip-and-PIN credit cards is going to change how organizations do business. Here are five best practices for adopting the technology.

Reality Bites: Virtualization Increases Cost of Security Breaches

A new study reports that virtualization can significantly increase the cost of recovery after a security breach. Is this the new reality?

The Ashley Madison Security Breach: An Affair to Remember?

The Ashley Madison security breach has everyone talking, but what's the takeaway from this affair for corporations looking to improve cybersecurity?