Over 4.2 Billion Records Were Exposed in 2016
The number of reported data breaches exceeded 4,000 and 53.3% of them were the result of hacking.
Multiple mechanisms work together to ensure that you are the only one having access to your sensitive information.
Your data is end-to-end encrypted by design – even Cyclonis staff and servers don’t have access to it.
The same encryption algorithm used by governments, financial institutions, and in military applications.
Your vault is designed so that your personal information can only be accessed with your personal master password.
Our Password Generator is designed to help you strengthen your passwords. The built-in generation algorithm can generate more complex passwords.
This feature is designed to further increase the strength of your vault.
Get tips, how-to guides, videos and the latest news in data security, password management, mobile security, data breaches, hacking and much more. Visit the Cyclonis blog to read more.
What do you need if you want to get your hands on just over 617 million account records stolen from 16 different websites? We have a surprisingly specific answer. You need an internet connection, about $16 thousand...Read more
Last year, Lenovo unveiled its 2018 laptop models and proudly announced that they come with a brand new feature – a built-in cover the slides over the webcam and ensures that nobody can spy on you. Peculiarly, they...Read more
Can a humble browser extension tell you whether or not your password is strong enough? Before we answer this question, we obviously need to explain what a strong password is. The classical definition states that a...Read more
Every now and again, vast databases full of billions of usernames and passwords hit the internet, and most of us can't help but wonder how can hackers collect such a humongous quantity of data, seemingly without...Read more
One of the most relevant features of a smartphone is undoubtedly taking photos and storing them for the benefit of the user. According to an online poll done by androidpolice.com, about 40% of the nearly 8000 users...Read more
Between July and September, Apple sold just under 47 million iPhones and about 10 million iPads. By contrast, Apple sold around 5.3 million Mac computers in the same time frame. Clearly, the world's favorite...Read more
Phishing, as you most likely know, is one of the most popular types of online attacks, and it's perfect for crooks that have next to no technical skills. While they might not be computer wizards, phishers have quite a...Read more
Ford Money is the money management and finance subsidiary of the world-famous Ford Motor Company. Ford Money was created in 1963 when it was known as Ford Credit. It has been a part of Ford Motor Company since then....Read more
A couple of years ago, Enox, a German consumer electronics brand, started selling Safe-KID-One – a smartwatch for children that comes with all the features you'd expect from such a device. You can put a SIM card in it...Read more
So you locked your Windows computer with a password, and you forgot it. Don't worry, it's not that uncommon at all. It happened to me once when I was a teenager. That was back when we used the good old Windows XP OS....Read more
Can you name the world's most lucrative type of cybercrime? Unfortunately, we can't definitively say whether or not your suggestion is correct. The world of online fraud is so vast and diverse that there simply is no...Read more
Some of you probably know how unpleasant forgetting a password is. There is, however, one thing that is even more frustrating – seeing the 'Incorrect Password' dialog when you're sure that the password you're entering...Read more