416 Posts

Douglas Bonderud

Freelance Writer

A freelance writer for three years, Doug Bonderud is a Western Canadian with expertise in the fields of technology and innovation. In addition to working for the IBM Midsize Insider, The Content Standard and Proteomics programs for Skyword, Doug also writes for companies like Ephricon Web Marketing and sites such as MSDynamicsWorld. Clients are impressed with not only his command of language but the minimal need for editing necessary in his pieces. His ability to create readable, relatable articles from diverse Web content is second to none. He has also written a weekly column for TORWars, a videogaming website; posts about invention and design for InventorSpot.com and general knowledge articles for WiseGeek. From 2010-2012, Doug did copywriting for eCopywriters.com. Doug is currently a municipal police officer, on track to become a fantasy/sci-fi author.

Written By Douglas Bonderud

Online Fraud and EMV: Conservation of Criminality?

The adoption of EMV, or chip-and-PIN cards, is increasing, but so is online fraud. How do companies adapt to this conservation of criminality?

End-to-End Email Encryption: Google Pushes Latest Project to Open Source

Google just pushed its email encryption project, E2EMail, to open source. What does this mean for the development of corporate email security?

Hurry Hard? Not For Hackers: Security Controls Fall in Less Than 12 Hours

A recent survey revealed that hackers can bypass security controls in under 12 hours. How can companies protect critical systems and eliminate new threats?

Browser Bully? Malicious Google Chrome Extension Pushes User Buttons

A malicious Google Chrome extension is making the rounds to deliver malvertising. Here's how it works and how to avoid getting scammed.

New Google Phishing Report: The Lure of Corporate Inboxes

A new phishing report from Google Research makes it clear: Corporate inboxes lure the largest number of phishing and malware attacks.

Microsoft Patching Delay: A Huge Hacking Valentine?

A patching delay has pushed new Microsoft updates back until March. Is this a belated Valentine's Day gift for cybercriminals?

GIT Researchers Sink SCADA Security With Proof-of-Concept Malware

According to a new report, a team of researchers created proof-of-concept malware that poses a serious threat to SCADA and ICS systems.

Hook, Line and Scammer: New Phishing Attack Favorite Reels In Cloud Storage

The phishing attack is still fraudsters' favorite trick. Researchers recently observed new phishing campaigns aimed at cloud storage services.

Beyond Virtual: Vulnerability Testing Tools Now Hack Hardware

A new Metasploit hardware bridge enables IT professionals to hack their own hardware, reducing the complexity of device-based vulnerability testing.

New Study Says 94 Percent of CISOs Worried About Application Security — What’s the Solution?

With 94 percent of CISOs worried about application security, it's worth asking: What makes the other 6 percent so confident?