Over 4.2 Billion Records Were Exposed in 2016
The number of reported data breaches exceeded 4,000 and 53.3% of them were the result of hacking.
Multiple mechanisms work together to ensure that you are the only one having access to your sensitive information.
Your data is end-to-end encrypted by design – even Cyclonis staff and servers don’t have access to it.
The same encryption algorithm used by governments, financial institutions, and in military applications.
Your vault is designed so that your personal information can only be accessed with your personal master password.
Our Password Generator is designed to help you strengthen your passwords. The built-in generation algorithm can generate more complex passwords.
This feature is designed to further increase the strength of your vault.
Get tips, how-to guides, videos and the latest news in data security, password management, mobile security, data breaches, hacking and much more. Visit the Cyclonis blog to read more.
Let's imagine for a second that you have done some things that you shouldn't have done. The police would very much like to have a word with you, and they're interested in who you speak to over the phone as well as...Read more
Have you heard yet? Hotmail has become Outlook now, and it offers its clients an updated user interface and upgraded options to perfect the overall email service. Don't worry though, you can still use your old Hotmail...Read more
It seems that the more we urge people to be tolerant towards each other, the more they refuse to do it. Indeed, it's not unusual to hear people complain about being discriminated based on anything from skin color to...Read more
The Internet is full of material that is not appropriate for kids and can be easily accessed through social media platforms like YouTube. No matter how old your child is, you probably cannot be beside him all the time...Read more
There are certain things we cannot do without, and a portable laptop is definitely one of them. Of course, smartphones have replaced many of the functions that laptops and stationary computers once offered...Read more
If you manage sensitive information at work, you probably have signed a non-disclosure agreement along with your employment contract. However, have you really gone through that agreement? Perhaps some confidential...Read more
Facebook users are often targeted by cybercriminals who seek to scam them, steal their personal information, or take over the control of their accounts. Therefore, it is no wonder its creators are coming up with more...Read more
In January, security specialist Troy Hunt analyzed a data dump of more than 770 million email addresses and 21 million passwords that was traded for free on hacking forums. The database had been compiled from hundreds...Read more
Starting a new social network that aims to compete with Facebook is not difficult at all. All you need is a firm conviction that you are cleverer than Mark Zuckerberg and some cash in your pocket. In simple terms, the...Read more
Monerujo is a mobile wallet used to store cryptocurrencies like bitcoin. Its advantage is that you can install it on your smartphone, connect to a remote node and using it straight away. Recently Monerujo announced...Read more
Last week, applicants for three US colleges – Hamilton in New York, Oberlin in Ohio, and Grinnell in Iowa – started receiving some strange emails. On the face of it, the messages looked like they were coming from the...Read more
A data breach is never good news, but some incidents are definitely worse than others. If, for example, a small internet forum for DIY enthusiasts is hacked, the loot is not that great (some emails, possibly some...Read more