Over 4.2 Billion Records Were Exposed in 2016
The number of reported data breaches exceeded 4,000 and 53.3% of them were the result of hacking.
Multiple mechanisms work together to ensure that you are the only one having access to your sensitive information.
Your data is end-to-end encrypted by design – even Cyclonis staff and servers don’t have access to it.
The same encryption algorithm used by governments, financial institutions, and in military applications.
Your vault is designed so that your personal information can only be accessed with your personal master password.
Our Password Generator is designed to help you strengthen your passwords. The built-in generation algorithm can generate more complex passwords.
This feature is designed to further increase the strength of your vault.
Get tips, how-to guides, videos and the latest news in data security, password management, mobile security, data breaches, hacking and much more. Visit the Cyclonis blog to read more.
Google has made not one, but two password storage mistakes that directly affect some of its users. This type of news is bound to get quite a few people upset, but before everyone starts pulling their hair out, let's...Read more
Quite a few of the people commenting on hacking incidents and data breaches often say that the user is the 'weakest link' in the cybersecurity chain, and we are fully aware that some of you may feel offended by this....Read more
Flickr is an online photo and video sharing service, which was owned by Yahoo until recently. Now it has been purchased by SmugMug. You can upload and share your images and videos on Flickr as well as post them...Read more
As time passes, cyber-crime is only becoming more prevalent – which is why it pays to invest at least a little bit of your time and energy in ensuring that you don’t become the victim of an online attack. There are a...Read more
In a recent blog post, Kurt Thomas and Angelika Moscicki from Google's security team spoke about, among other things, account hijacking and how much it costs. It turns out that a hacking group can charge as much as...Read more
Good news for those of you who use Flickr. The image and video hosting service has finally removed the cumbersome Yahoo login and is no longer tied to Yahoo overall. The image and video sharing service Flickr...Read more
On May 12, 2017, the WannaCry ransomware encrypted the files of over 200 thousand Windows PCs all around the world and caused millions of dollars in damages. Thanks to EternalBlue, a hacking tool allegedly developed...Read more
According to Vade Secure, PayPal is the second-most targeted brand by phishers. This shouldn't be very surprising. We're talking about the world's most recognizable online payment platform, and unauthorized access to...Read more
It would appear that SMS bombing (also known as Text bombing) doesn't seem to have a definition that all experts agree upon. Many of the hits you get on Google will tell you that SMS bombing is the act of using an...Read more
Pandora Internet Radio, also known as Pandora Radio or simply Pandora is an online radio service. It has a strong focus on music streaming. Not only that but Pandora has an automated music recommendation feature which...Read more
The Boost Mobile brand was brought to the US nearly eighteen years ago. Since then, the phone retailer and telecommunication service provider has invested enormous sums of money into marketing efforts, and it now...Read more