NSA Surveillance Spurred Tech Firms to Tighten Security- Examining the EFF Survey Report

The PRISM revelations served as a wake-up call for tech firms in terms of privacy, security, and NSA surveillance. The documents leaked by Edward Snowden indicates that the NSA has left no stone unturned in getting access to a huge amount of sensitive user data. They have been successful in circumventing the majority of encryption technologies over […]

Read More

The cards on the table: people are being killed because of metadata

I’m the pessimist of the company, that’s basically my job description. But recent news like this from The New York Review of Books will make anybody want to start a plush bear manufacturing company and forget about all things digital. ‘We Kill People Based on Metadata’ Ok, so that’s scary and explicit. I’ve been saying […]

Read More

Considering Your Most Vulnerable Security Links- How to Combat Social Engineering Attacks

Enterprises invest huge sums of money on developing security mechanisms to protect company assets and networks against cyber attacks. With ever-emerging security threats, it becomes imperative for any organization to bolster their security controls. Organizations tend to focus on introducing new technical upgrades, improving encryption technologies, better threat detection, and prevention tools for preventing unauthorized access […]

Read More

EFF Recognizes SpiderOak For Having Your Back

The Electronic Frontier Foundation (EFF) just released it’s annual “Who Has Your Back?” report honoring our efforts – and others – on the legal and privacy front of protecting our users. Of the six criteria used to assess a company’s practices and polices, SpiderOak received five of the six. According to the EFF, “SpiderOak earns […]

Read More

Protection against Mobile Phishing Attacks- Avoid Being the Target of a Scam

In today’s age of technology, it is safe to say that the mobile phones have surpassed desktop PCs in terms of popularity and usability. You can get all your tasks accomplished on a small portable device, rather than sitting in front of a static computer for hours. You can surf the Internet, pay your bills, do shopping, […]

Read More

Usability challenges on privacy-preserving systems (Part 1)

User experience or UX is always a challenge when developing any kind of system. You can choose to mimic some of the well-established systems, taking advantage of the fact that millions of users are used to it. Or, you can go crazy and figure out new and interesting ways of doing the usual things like […]

Read More

Security in the Age of Telecommuting: Ensuring Remote Access Connections Are Protected

There has been significant growth in the number of individuals working remotely or telecommuting in recent years. Remote connections, also called VPNs, are an attractive alternative for many businesses; they increase employee productivity, save company expenses, and require less maintenance. In order for this large workforce to carry out business effectively and efficiently, it is important […]

Read More

Who holds the keys?

There has been a lot of noise around encryption in the past year and some people/companies miss a really important point. We’ve talked already about privacy as a concept, it might sound repetitive but it’s an idea that needs to be welded into our brains. When you talk about privacy, the first question to answer […]

Read More

Protecting Student Data in the Cloud

Cloud computing provides effective connectivity and easy access to the latest computing resources. This technology has become extremely popular among businesses because of its flexibility and cost effectiveness. Gradually, the education sector is also making a transition to cloud services. Many school districts are embracing cloud computing to improve academic delivery and learning, provide personalized student […]

Read More

Managing PCI DSS Compliance in Cloud Computing

Credit card hacks and data breaches are on the rise these days. Recently, retail giant Target became a victim of a massive data breach that affected millions of customers. Cyber criminals are also using the cloud environment for launching cyber attacks. As more businesses are moving towards adopting cloud-based services, the risk of security breaches […]

Read More