Over 4.2 Billion Records Were Exposed in 2016
The number of reported data breaches exceeded 4,000 and 53.3% of them were the result of hacking.
Multiple mechanisms work together to ensure that you are the only one having access to your sensitive information.
Your data is end-to-end encrypted by design – even Cyclonis staff and servers don’t have access to it.
The same encryption algorithm used by governments, financial institutions, and in military applications.
Your vault is designed so that your personal information can only be accessed with your personal master password.
Our Password Generator is designed to help you strengthen your passwords. The built-in generation algorithm can generate more complex passwords.
This feature is designed to further increase the strength of your vault.
Get tips, how-to guides, videos and the latest news in data security, password management, mobile security, data breaches, hacking and much more. Visit the Cyclonis blog to read more.
Let's say a moderately popular online game that you play gets hacked. You've used a personal email address that's reserved mostly for junk mail. Alongside it, the hackers steal your home IP address, the nickname you...Read more
Did you know that Google Chrome has an Autofill feature? It can be very useful for avid online shoppers. With Autofill, you can store your credit or debit card along with any other crucial data already on your web...Read more
Seems like sometimes things vanish on our computers or phones for no good reason. Like yesterday I had to re-install Viber on my mother's phone because it was just gone. Whether it's glitches or ghosts or just human...Read more
While it is understandable why many users consider two-factor authentication to be clumsy and bothersome, it most certainly has merit when it comes to Internet safety and the overall security of a user's online...Read more
Admittedly, SSH isn't something the average home user deals with on a daily basis, but nevertheless, it probably pays to know what it is. SSH stands for Secure Socket Shell, and it's a network protocol used by system...Read more
Did you know that back in 2015, Myspace had about 50 million unique monthly visitors? It was thought that this sort of traffic was mostly generated by people logging into their old accounts so that they can download...Read more
We would hardly find a multi-million dollar yearly revenue generating company that has not experienced even the tiniest data breach or a security problem at least once in its lifetime. Attacks on companies,...Read more
Have you heard that Google+ is no more? Well, that's not exactly the truth because it will take some time before the company dismantles the social networking platform. At this time, the due date is August 2019. If...Read more
Lately, there have been talks about a new threat to Facebook users also known as 2018 Facebook friend request scam. It is said some cybercriminals are copying users’ accounts to send friend requests to their contacts....Read more
The Pentagon is one of the world's most important buildings, and the US Defense Department has done a lot to ensure that you can't just walk through the front door and roam around freely. In fact, simply getting in is...Read more
We all have things we wish to hide on our computers, especially if we share it with other people like members or co-workers. Whether its business or company secrets, personal photos or naughty movies you don't want...Read more
Although it rarely attracts as much media attention as Facebook or Twitter, Tumblr has always been one of the world's major microblogging/social network platforms. It gives hundreds of millions of users the...Read more