Over 4.2 Billion Records Were Exposed in 2016
The number of reported data breaches exceeded 4,000 and 53.3% of them were the result of hacking.
Multiple mechanisms work together to ensure that you are the only one having access to your sensitive information.
Your data is end-to-end encrypted by design – even Cyclonis staff and servers don’t have access to it.
The same encryption algorithm used by governments, financial institutions, and in military applications.
Your vault is designed so that your personal information can only be accessed with your personal master password.
Our Password Generator is designed to help you strengthen your passwords. The built-in generation algorithm can generate more complex passwords.
This feature is designed to further increase the strength of your vault.
Get tips, how-to guides, videos and the latest news in data security, password management, mobile security, data breaches, hacking and much more. Visit the Cyclonis blog to read more.
Hikvision products are known for being of high quality. Naturally, this means they are a bit costly as well. We tend to buy expensive things because we expect to get our money's worth so it's always frustrating when...Read more
There's no denying that social media dominates much of our online lives. It has changed the way we communicate with our friends, our loved ones, our colleagues, our schoolmates etc. and dating is no exception. With...Read more
A little over a month ago, a cybercriminal used Dream Market, a dark web marketplace, to try and sell just under 620 million user records stolen from a total of 16 websites and apps. The criminal in question goes by...Read more
There are many reasons why you might want to backup your Yahoo account – you may wish to sort through or share information that was in it offline, or just want extra security, in the case of said account getting...Read more
Noam Rotem is half of the duo of security researchers that recently discovered the data leak affecting the users of a Middle Eastern Caller ID application. In early March, he was called in to help investigate another...Read more
Transferring a text document, a picture, video file, music or audio files, or other data from one device to another is usually pretty simple. You just hook up your phone to your computer for example, via USB cable and...Read more
Let's imagine for a second that you have done some things that you shouldn't have done. The police would very much like to have a word with you, and they're interested in who you speak to over the phone as well as...Read more
Have you heard yet? Hotmail has become Outlook now, and it offers its clients an updated user interface and upgraded options to perfect the overall email service. Don't worry though, you can still use your old Hotmail...Read more
It seems that the more we urge people to be tolerant towards each other, the more they refuse to do it. Indeed, it's not unusual to hear people complain about being discriminated based on anything from skin color to...Read more
The Internet is full of material that is not appropriate for kids and can be easily accessed through social media platforms like YouTube. No matter how old your child is, you probably cannot be beside him all the time...Read more
There are certain things we cannot do without, and a portable laptop is definitely one of them. Of course, smartphones have replaced many of the functions that laptops and stationary computers once offered...Read more
If you manage sensitive information at work, you probably have signed a non-disclosure agreement along with your employment contract. However, have you really gone through that agreement? Perhaps some confidential...Read more