Back Up & Store Your Important Files in the Cloud.
Access your files whenever and wherever you want and stop worrying about catastrophic data loss. Learn more →
Our products offer data encryption, cloud integration and a number of other features to help you organize your data, plan your day, and get through the rest of your everyday tasks with ease. We incorporate a multitude of technologies with the goal of affording you an easier, more hassle-free online life.
Our products’ design ensures that they work whenever and wherever you need them.
Comprehensive solutions to real-world problems.
A straightforward setup process and a sleek, intuitive interface come as standard in all our applications.
Get tips, how-to guides, videos and the latest news in data security, password management, mobile security, data breaches, hacking and much more. Visit the Cyclonis blog to read more.
Security researchers with Cyble published a new report on the rise of malware using .lnk shortcut files to deliver their final payload. One highlight of the report was a .lnk file builder called Quantum. Quantum is... Read more
There is yet another scam making the rounds, once again abusing the name of a legitimate piece of PC security software for illegal profit. This scam is referred to simply as the "McAfee - Act Now To Keep Your Computer... Read more
DigitalInitiator is the name of a piece of potentially unwanted software that can end up on Mac computers. DigitalInitiator is adware or ad-supported software. It belongs to the family of AdLoad adware and brings... Read more
Harditem is the name of a newly discovered strain of ransomware. The malicious program behaves like you would expect it to - it encrypts files on the victim system, scrambling most document, media and archive file... Read more
Ultimate Video Adblocker is a browser extension for Chrome that claims it can block advertisements on multiple streaming video platforms. However, what it also does is exhibit functionality typical of adware... Read more
Worldwidedefence dot com is a confusingly named misleading website. The name has nothing to do with anything on the site itself, and the site exists to serve only one purpose - to get intrusive advertising inside the... Read more
A new variant belonging to the TargetCompany ransomware family was spotted in the wild only recently. The new ransomware strain is called the FARGO ransomware. FARGO will encrypt files on the infected system,... Read more
IceXLoader is the name of a new piece of malware spotted in the wild in recent weeks. As the name suggests, IceXLoader is used as a loader - an intermediary type of malware used to deliver and load other components in... Read more
Trending-celebs dot com is a lazily thrown together misleading website. The sole purpose of this and other misleading sites like it is to get users to accept push notifications and use this functionality to push ads... Read more
The Sheeva ransomware is a new strain of file-encrypting malware. The ransomware does not seem to belong to any major ransomware family. Sheeva would encrypt files on the victim system, affecting most non-essential... Read more
There are hundreds of scams on the Internet that promise naive visitors expensive but also very fake gifts. The new "Win Samsung Galaxy S22" pop-up scam is yet another one of those. When a user lands on a domain name... Read more
The Eijy ransomware is a newly discovered strain of file-encrypting malware. It belongs to the family of Djvu ransomware clones, which is growing by a dozen every couple of weeks. Eijy will act like most other strains... Read more
There is a newly discovered ransomware strain in the wild and it has a somewhat confusing name. The new ransomware is called simply "Non" and it belongs to the family of Phobos ransomware clones. Once deployed on a... Read more
Get-shields dot com is a domain name associated with a misleading website that uses fake virus and malware notifications and warnings to push ads into visitors' browsers and redirect to further questionable pages.... Read more
A relatively new threat actor has pulled off multiple attacks against big targets in both Europe and Asia. The hacker group has been dubbed "ToddyCat" and one of the tools used by the outfit is the Samurai backdoor.... Read more
Get-user-id is the name of a piece of potentially unwanted software that exhibits signs typical of both a browser hijacker and an ad-supported program or adware. Get-user-id will change the settings of your Mac... Read more
Hexaput0n dot click is a very simple misleading website, set up online with a single goal - to shove intrusive and potentially harmful ads in your browser. When you land on the page, very likely after you clicked a... Read more
The Magnus ransomware is a new strain of file-encrypting malware. The strain does not seem to belong to one of the big major families of ransomware. The Magnus ransomware will encrypt files, as can be expected from... Read more