We are excited to share that we are set to begin a new chapter with Dropbox, Inc. Dropbox is acquiring our IP technology to embed natively into the Dropbox product, bringing end-to-end, zero-knowledge encryption to millions of business customers around the world. Check out our blog to find out more!

Boxcryptor Blog

Security – Cloud – Updates

The 5 Best Hacker Movies

The 5 Best Hacker Movies

In hacker movies technical details are sometimes put aside in favor of suspense and understandability. Still, a good hacker movie shows us the possibilities and dangers of the cyber world. Here are our 5 favorites.

Best Clouds for Companies

Business Clouds - Find the Best Cloud with our Comparison

In this list we compare four clouds that are popular amongst companies who work in the cloud. Also, we give you a short overview of what you have to be aware of when choosing a cloud.

Amazon Web Services AWS and Encryption

Amazon Web Services and Data Security - Why this Tech-giant Recommends Encryption

Werner Vogels, CTO of Amazon, recently recommended encryption. It turns out that encrypted data is not only a minimized risk for the owner of the data, but also for the cloud provider that stores it.

10 Tips for Cyber Security

10 Tips for More Cyber Security – Secure Passwords, Encryption, and More

Let me tell you a story about my cereal, my smartphone and I. Also, there are some tips about cyber security.

European General Data Protection Regulation

EU General Data Protection Regulation – How will the new customer protection laws affect companies?

On the 14th of April the General Data Protection Regulation (GDPR) has been passed. Companies will have two years to change their data protection accordingly. The regulation also affects international businesses who deal with data of European citizens.

Malware in Email Attachments - Which File Extensions are Dangerous?

Most computer viruses are spread via email attachments. This does not come as a surprise, since email became one of the most used means of communication. In this article we will show you how to protect yourself from malware spread over email.

Zero Days

Berlin International Film Festival and Zero-Day Exploits

At the Berlin International Film Festival 2016 Oscar-winning director Alex Gibney takes on the topic of Zero-Day exploits with a prominent example: The computer worm Stuxnet.

Red Carpet

Oscars Special - Data Security and the Cloud in Hollywood

Quentin Tarantino’s The Hateful 8 won best original score at this year’s Annual Academy Awards – one could say that it is late by one year. Why? Data privacy plays a not to small role in that.