Usability challenges on privacy-preserving systems (Part 2)

In the previous post we started the first of several posts explaining the usability challenges when developing a privacy preserving service. Today we will continue with passwords and how they are processed. Password strength The main problem with making a system’s security depend on a password is that good ones are really hard to remember (or are […]

Read More

Protecting Data Against SQL Injection Attacks

Data attacks have unfortunately become commonplace these days, with new reports of penetrated security systems being reported on a seemingly regular basis. SQL injection is the most commonly used form of attack by intruders to compromise enterprise data, as it is highly effective and successful in gaining access. The SQL injection vulnerability has been around […]

Read More

Welcome Firefox Sync to the ‘Zero-Knowledge’ set of applications!

As a company, SpiderOak would of course benefit from being the only provider of privacy services. But there’s more to it than just money. We don’t want to be the only company in the privacy field because society benefits from variety in this case. So we embrace this, and our goal is to conquer markets where […]

Read More

NSA Surveillance Spurred Tech Firms to Tighten Security- Examining the EFF Survey Report

The PRISM revelations served as a wake-up call for tech firms in terms of privacy, security, and NSA surveillance. The documents leaked by Edward Snowden indicates that the NSA has left no stone unturned in getting access to a huge amount of sensitive user data. They have been successful in circumventing the majority of encryption technologies over […]

Read More

The cards on the table: people are being killed because of metadata

I’m the pessimist of the company, that’s basically my job description. But recent news like this from The New York Review of Books will make anybody want to start a plush bear manufacturing company and forget about all things digital. ‘We Kill People Based on Metadata’ Ok, so that’s scary and explicit. I’ve been saying […]

Read More

Considering Your Most Vulnerable Security Links- How to Combat Social Engineering Attacks

Enterprises invest huge sums of money on developing security mechanisms to protect company assets and networks against cyber attacks. With ever-emerging security threats, it becomes imperative for any organization to bolster their security controls. Organizations tend to focus on introducing new technical upgrades, improving encryption technologies, better threat detection, and prevention tools for preventing unauthorized access […]

Read More

EFF Recognizes SpiderOak For Having Your Back

The Electronic Frontier Foundation (EFF) just released it’s annual “Who Has Your Back?” report honoring our efforts – and others – on the legal and privacy front of protecting our users. Of the six criteria used to assess a company’s practices and polices, SpiderOak received five of the six. According to the EFF, “SpiderOak earns […]

Read More

Protection against Mobile Phishing Attacks- Avoid Being the Target of a Scam

In today’s age of technology, it is safe to say that the mobile phones have surpassed desktop PCs in terms of popularity and usability. You can get all your tasks accomplished on a small portable device, rather than sitting in front of a static computer for hours. You can surf the Internet, pay your bills, do shopping, […]

Read More

Usability challenges on privacy-preserving systems (Part 1)

User experience or UX is always a challenge when developing any kind of system. You can choose to mimic some of the well-established systems, taking advantage of the fact that millions of users are used to it. Or, you can go crazy and figure out new and interesting ways of doing the usual things like […]

Read More

Security in the Age of Telecommuting: Ensuring Remote Access Connections Are Protected

There has been significant growth in the number of individuals working remotely or telecommuting in recent years. Remote connections, also called VPNs, are an attractive alternative for many businesses; they increase employee productivity, save company expenses, and require less maintenance. In order for this large workforce to carry out business effectively and efficiently, it is important […]

Read More