Over 4.2 Billion Records Were Exposed in 2016
The number of reported data breaches exceeded 4,000 and 53.3% of them were the result of hacking.
Multiple mechanisms work together to ensure that you are the only one having access to your sensitive information.
Your data is end-to-end encrypted by design – even Cyclonis staff and servers don’t have access to it.
The same encryption algorithm used by governments, financial institutions, and in military applications.
Your vault is designed so that your personal information can only be accessed with your personal master password.
Our Password Generator is designed to help you strengthen your passwords. The built-in generation algorithm can generate more complex passwords.
This feature is designed to further increase the strength of your vault.
Get tips, how-to guides, videos and the latest news in data security, password management, mobile security, data breaches, hacking and much more. Visit the Cyclonis blog to read more.
MyFitnessPal is a handy smartphone app and website that helps users keep track of their diets and exercise regimes to find the best caloric intake and macro-nutrients for their fitness goals (both short term and long...Read more
The password's flaws as an authentication mechanism became apparent years ago, and to try and minimize the impact they have on us, software developers and vendors have been implementing a number of different features...Read more
We recently told you about Apple's Keychain app and the Autofill feature. Both of these functions are extremely useful in making your browsing experience much more streamlined and fun. Keychain allows Apple users to...Read more
iCloud Keychain is a very useful tool and part of your Apple account. iCloud Keychain can be used to store your online login data, your personal information, your credit or debit card details, and your wireless...Read more
Back when Facebook wasn't the social media titan that it is today, people thought of their presence on the platform as something minor and rather unimportant. After all, it's just a site to upload vacation photos and...Read more
When security researchers say that adding '123' to the end of a weak password isn't doing a whole lot to improve its security, many people tend to think that the paranoia levels are running too high. Users reckon that...Read more
In early 2018, Google launched what it called Project Strobe – a thorough review of how third-party apps and consumers engage with the search engine giant's services. After carefully poking through Google+, Mountain...Read more
Do you want to change your login details and your gamer tag on your Xbox account? It's perfectly doable but while you can modify some of the details on your Xbox One console itself you'll need to access a web browser...Read more
Online sextortion scams are not exactly a recent phenomenon, and it's fair to say that no two are exactly the same. The schemes range from simple to extremely elaborate, and in some cases, the crooks tend to be...Read more
The prospect of using computers to illegally earn money from regular people seems appealing to quite a few wannabe criminals. Predictably, some are better than others. Luo Moumou, a Chinese individual who authored a...Read more
Few can argue that the advent of the Internet brought opened many doors for both established businesses and entrepreneurs alike – and the continued cyberization of the modern world has only increased these...Read more
So you've decided to cleanse your social media accounts for some reason. Maybe you don't feel it's wise to upload so much personal information and share it with the world and potentially nosey neighbors. Or maybe you...Read more