Over 4.2 Billion Records Were Exposed in 2016
The number of reported data breaches exceeded 4,000 and 53.3% of them were the result of hacking.
Multiple mechanisms work together to ensure that you are the only one having access to your sensitive information.
Your data is end-to-end encrypted by design – even Cyclonis staff and servers don’t have access to it.
The same encryption algorithm used by governments, financial institutions, and in military applications.
Your vault is designed so that your personal information can only be accessed with your personal master password.
Our Password Generator is designed to help you strengthen your passwords. The built-in generation algorithm can generate more complex passwords.
This feature is designed to further increase the strength of your vault.
Get tips, how-to guides, videos and the latest news in data security, password management, mobile security, data breaches, hacking and much more. Visit the Cyclonis blog to read more.
In the aftermath of a data breach, the affected organizations usually issue official statements which are supposed to give people more information on what has happened. The wording does tend to get a bit fuzzy when...Read more
5F4DCC3B5AA765D61D8327DEB882CF99 – for the vast majority of you, this probably looks like a random string of letters and digits. For cybercriminals going after people's personal data, however, this particular mess of...Read more
In the past, we've warned you of scammers who are trying to steal your Social Security number (SSN). When that happens your SSN could be suspended. Sometimes, the scammers will need you to confirm your number to...Read more
Recently, we've been getting news of new LinkedIn-related phishing attacks. According to the news, the hackers use an array of assorted schemes in order to pressure their targets into visiting web pages laced with...Read more
Have you seen advertisements posted on Instagram that offers designer sunglasses for practically nothing? Remember that if something sounds too good to be true, it is most likely a scam. The offers we are discussing...Read more
If you've been using the Internet for a while, and in this day – who hasn't, chances are that you probably have more than one email account set up in your name. Accounts are made as and when they are needed, and it is...Read more
Recently we covered the problem of Mozilla Thunderbird constantly asking you for your password and today we're going to look at a similar problem with Firefox. Mozilla Firefox is a free and open-source web...Read more
What comes to mind when you hear the words “hacking tool?” You probably think about sinister computer infection schemes, where cybercriminals barge into vulnerable systems to steal important information. That idea is...Read more
How many emails do you send out every day? How many do you receive? These numbers vary from person to person, depending on their position, their social life online, their hobbies, and even their attitude towards...Read more
For as little as $50 per month, wannabe cybercriminals can go on a popular hacking forum and rent what has been advertised as WSH Remote Access Tool (RAT). As we'll find out in a moment, at least some of them seem to...Read more
As I'm sure some of you know, Mozilla Thunderbird is a free and open-source cross-platform email and news service, RSS feed, and chat client. It was developed by the Mozilla Foundation, naturally. The Thunderbird...Read more