Back Up & Store Your Important Files in the Cloud.
Access your files whenever and wherever you want and stop worrying about catastrophic data loss. Learn more →
Our products offer data encryption, cloud integration and a number of other features to help you organize your data, plan your day, and get through the rest of your everyday tasks with ease. We incorporate a multitude of technologies with the goal of affording you an easier, more hassle-free online life.
Our products’ design ensures that they work whenever and wherever you need them.
Comprehensive solutions to real-world problems.
A straightforward setup process and a sleek, intuitive interface come as standard in all our applications.
Get tips, how-to guides, videos and the latest news in data security, password management, mobile security, data breaches, hacking and much more. Visit the Cyclonis blog to read more.
Trigona ransomware is the name of a strain of file-encrypting malware. The ransomware is believed to be a rebranding of a formerly unnamed strain. The new version includes functionality that allows the ransomware to... Read more
Updaterglobal dot com is a misleading website that uses fake, doctored anti-bot check mockups to push ads in your browser. Similar pages will attempt to trick the user they are passing an anti-bot check, while in... Read more
Woreflint is the detection name assigned to a malicious program that functions as a trojan horse. Detection names are not always the same thing as the actual payload and the Woreflint detection can signify a number of... Read more
Proud Browser is the name of an application that is distributed in the form of a browser extension and functions as adware. Adware is software that will often install on your system without your knowledge or consent... Read more
Allactualspot dot com is a misleading website that attempts to push ads in users' browsers. Landing on the page in the first place means you very likely hit a bad redirect or clicked on a rogue ad on a different site.... Read more
Whiteboard New Tab is a rogue browser extension that shares similarities with browser hijackers. Browser hijackers are a subcategory of potentially unwanted software. This sort of app will make changes to your browser... Read more
IdentityStack is an adware application that belongs to the AdLoad family of ad-supported programs, running on Macs. IdentityStack can drop ads into the pages you browse online or display them as pop-ups. This is... Read more
A new wave of malicious spam emails is doing the rounds, distributing a new scam, called simply the 'storage capacity' scam. The setup used in the scam is very simple and we have seen similar versions of the same idea... Read more
Higedgene dot com is a misleading website that will attempt to trick users into accepting push notifications from it. Similar misleading pages use push notification functionality to push ads in your browser. In the... Read more
Uyro ransomware is the name of a new Djvu ransomware clone. The new variant was discovered in late 2022. Uyro behaves like all other Djvu clones. It encrypts the victim system, leaving files scrambled. Once encrypted,... Read more
A new scam is being circulated online, attempting to phish out victim credentials. The new scam is very simple in its design. Victims receive an email that claims it contains a link to a Microsoft Word document hosted... Read more
Surf Start is a rogue extension for Chrome that offers quick access to content related to surfing in your new tab page. However, one part of its functionality is not well disclosed in its description. The Chrome web... Read more
Cipher ransomware is the name of a newly discovered ransomware variant based on MedusaLocker code. Cipher behaves largely like other MedusaLocker clones. It will encrypt files on the infected system and change their... Read more
PC App Store is the name of a potentially unwanted application that functions as adware, in addition to its advertised functionality. PC App Store can be broadly categorized as a rogue optimization app. It claims that... Read more
Researchers discovered a new ransomware variant that belongs to the Dharma family of clones. The new version is called the HBM ransomware. HBM encrypts documents, media files, archives and databases on the victim... Read more
InputView is the meaningless name of an ad-supported application for Mac. InputView belongs to the big family of AdLoad adware clones and variants. You may find its icon in your Applications folder - a bland circle... Read more