
Privacy software provides on-device protection from increasingly sophisticated hackers
Cheyenne, Wyoming, April 2, 2019. BlackFog, Inc. today announced the release of its on-device Cybersecurity and Data Privacy solution for Android devices. BlackFog Privacy protects users from online threats by putting a stop to unauthorized data collection, profiling, cryptomining, phishing, and fake news over the Internet and Dark Web.
Cyber-attacks are increasing, both in number and sophistication and people are vulnerable to attack every time they visit a website or use an application. With mobile devices currently representing 52% of all web traffic and Hackers attacking from every angle, collecting personal information and attacking users through seemingly innocent online ads, the need for a preventative solution to ensure no unauthorized data can ever leave a user’s device has never been more critical.
Most cybersecurity solutions focus on trying to stop an attacker from getting in, or after they have already done damage. BlackFog stops threats at every stage of their life-cycle, before they have a chance to remove any data. By focussing on prevention, BlackFog monitors the collection of any personally identifiable data, stopping the outbound data flow in real-time so no unauthorized data can ever leave the device. With 12 layers of defense, BlackFog protects against ransomware, spyware, malware, phishing, unauthorized data collection and profiling.
“In 2017 alone we saw a 40% increase in mobile cyber-attacks, a statistic that continues to escalate. As we spend more of our lives online, our personal data is becoming increasingly valuable,” commented Dr Darren Williams, CEO of BlackFog. “With the worldwide market share of Android currently around 75% we are excited to offer this technology to Android users globally. We successfully block more than 24 million threats, enabling our customers to use their devices with confidence, knowing that their personal data is secure at all times.”
BlackFog Android edition is available for immediate download for $1.99 a month from the company web site. BlackFog is also available for Windows, macOS and iOS devices.
About BlackFog
BlackFog is the category-defining vendor in anti data exfiltration (ADX). Founded in 2015, the company invented ADX on the thesis that the endpoint is the only control point capable of stopping data from leaving an organization, an architectural bet that has now been validated across three exfiltration vectors: ransomware, shadow AI, and autonomous AI agents. BlackFog’s endpoint-native platform protects more than 500 enterprises, government agencies, and critical infrastructure operators worldwide. The company is the publisher of the annual State of Ransomware report and the BlackFog/Sapio Shadow AI Research, the most-cited primary research in the category. BlackFog’s recognition includes the teiss Awards 2026, the AI Excellence Award 2026, the Cybersecurity Excellence Awards 2026, and the Cybersecurity Breakthrough Award. Headquartered in San Francisco with international operations in London and Belfast. Learn more at blackfog.com.
Share This Story, Choose Your Platform!
Related Posts
Shadow AI and Governance: Why Traditional Control Is Failing CISOs
Shadow AI and Governance: Why traditional controls are failing CISOs as AI adoption accelerates, increasing risk and reducing visibility.
Oracle Breach: What Happened and Why It Matters
The 2025 Oracle breach exposed millions of records across three separate incidents. Learn how attackers got in, which industries were hit, and how to protect your organization.
What Is An Integrity Data Breach?
Find out what an integrity data breach involves, how it differs from data loss and why it's vital for businesses to be aware of the potential risks.
How Quickly Should A Suspected Data Breach Be Reported?
Data breach reporting deadlines can be tight. Learn when firms must report a suspected data breach, who must be informed and the risks of delay.
What Are The 5 Most Common Sources Of Data Leaks On The Internet?
Understanding how these five common sources of data leaks occur and how they can be prevented is an essential part of a data security strategy.
What Are The Latest Major Data Breaches And What Was Leaked?
These ten major data breaches from 2025 highlight the worldwide scale of cybersecurity incidents in the past year.






