Real-time cyber privacy protection dramatically improves performance and security of computers.
Cheyenne, Wyoming, February 8, 2016. Today BlackFog launched BlackFog Privacy, the first in a range of cyber privacy products designed to protect your online and offline privacy using real-time threat detection and blocking. Using a triage approach to data privacy, BlackFog Privacy is able to intercept, detect and respond to data profiling and collection requests before they happen and block any data leakage from your computer.
With more than 20% of all online traffic focused on advertising, marketing, data collection and profiling (with some sites exceeding more than 40%), it is crucial that individuals and corporations have a way to control the information they are disclosing. BlackFog Privacy provides visual insight into your data using a series of gauges, so you can see at a glance where your data is going and what factors contribute to your privacy.
“After thousands of hours of research and development and listening to customers needs and concerns we are excited to offer a lightweight holistic solution to protect individual and corporate privacy”, said Dr. Darren Williams, Founder and CEO of BlackFog.
Through a layered approach to security BlackFog Privacy provides real-time cyberattack defense and protection and consists of 12 layers of defense against ransomware, spyware, malware, phishing, unauthorized data collection and profiling.
In addition, BlackFog Privacy is able to remove existing forensic data from your computer, lockdown all your system settings and even notify you when your microphone has been activated for cases when your microphone is hijacked by spyware. BlackFog can also detect and prevents data collection from many spyware products.
The software is available for Windows 7, 8 and 10 and automatically provides weekly updates to all rules to ensure your computer remains safe as new threats are discovered. A 30 day trial is available from the company web site at http://www.blackfog.com. Release pricing is $19.95 per year and will be available until March 31st, 2016, after which it will be $35.00 per year. Bundle pricing is also available to protect multiple devices.
About BlackFog
BlackFog provides fileless cyberattack defense for real time protection against online threats. It focuses on non signature based threat detection using outbound traffic monitoring to protect the device and privacy of the end user. It consists of 12 layers of defense against ransomware, spyware, malware and unauthorized data collection and profiling. BlackFog, Inc. is a privately held corporation based out of Cheyenne, Wyoming, USA. For more information about BlackFog, visit www.blackfog.com or contact media at blackfog.com.
Related Posts
Is Transparency Important Beyond Compliance After a Cyberattack?
Understand whether transparency following a cyberattack matters beyond compliance - with real-life examples like Uber's cover-up. Learn the benefits and risks of transparency - from trust building to reputation risk.
A quarter of cybersecurity leaders want to quit
A new research study commissioned by BlackFog reveals that 24% of cybersecurity leaders are looking to leave their jobs due to stress and high demands.
Ongoing: New Ransomware Gangs in 2024
Ransomware gangs continue to break records and BlackFog will track all new ransomware gangs in 2024.
TAG Blog Series 4 – An ADX Action Plan for Enterprise
In this 4th blog series, we explore the benefits of Anti Data Exfiltration (ADX) and how BlackFog effectively implements this crucial on-device protection. We provide actionable recommendations for developing an ADX action plan tailored to various organizational needs and business scenarios, ensuring practical and effective deployment of ADX solutions.
BlackFog Wins 2024 CyberSecurity Breakthrough Award
BlackFog Wins Coveted ‘AI-based Cybersecurity Innovation of the Year' in the 2024 CyberSecurity Breakthrough Awards Program
Big Game Hunting is on the Rise in Cybercrime
Big game hunting in cybercrime refers to attacks where cybercriminals target large organizations with the goal of demanding hefty ransoms. This article explores the tactics used in these attacks, provides real-world examples, and explains why this form of cybercrime is becoming increasingly common.