sb-au logo
Story image

NordVPN announces new file encryption tool

30 May 2019

VPN services company NordVPN has created a new cybersecurity tool NordLocker. NordLocker will secure files stored on a user’s computer or in the cloud with end-to-end encryption.

“We believe that the digital environment must be better than it is today. As a company, we strive to move towards becoming an all-around cybersecurity solution that people trust,” says NordVPN CMO Marty P. Kamden.

“By releasing NordLocker, we want to make top-notch data security available for everyone – regardless of their tech skills. To achieve this, we tried to combine the best usability practices with the highest encryption standards.”

NordLocker will be a file encryption app for macOS and Windows.

It will encrypt files stored on a computer or in the cloud.

NordLocker is created using the two most secure encryption algorithms known today – Advanced Encryption Standard (AES-256) and 4096-bit RSA.

Additionally, the new tool will have NordVPN’s zero-knowledge encryption process to ensure security.

Users will be able not only to encrypt their files but to share them securely by managing access permissions.

“From vacation photos to your digital creations and documents of any kind – nearly all files contain bits of sensitive information. And that makes them worth protecting,” says Kamden.

“We expect that NordLocker will be popular both for personal use and for work-related cases, especially for those who work in multicultural environments - startups, freelancers, and digital nomads.”

At the moment, NordLocker is going through internal stress-tests.

It is expected that the first beta version will be released this summer.

NordVPN is an online privacy and security solution, used by over 12 million internet users worldwide.

It offers military-grade encryption with privacy solutions.

NordVPN is a VPN service provider used by over 12 million internet users worldwide. 

NordVPN offers double VPN encryption, malware blocking and Onion Over VPN.

Its apps provide an algorithm allowing to automatically connect to the fastest server.

The product has over 5,000 servers in 60 countries worldwide and is P2P-friendly.

VPNs, or virtual private networks, redirect all the data you send and receive through a special VPN server. 

This change has two main benefits: it encrypts all the data, and it replaces your IP address.

The end result: it gets much more difficult to track what you do online, steal your passwords, or block you from the content you want. 

It makes users safer from their internet service provider, government espionage, advertisers, identity thieves, and hackers.

Story image
Gartner: By 2023, 65% of the world will have personal data covered under modern privacy regulations
“Security and risk management (SRM) leaders need to help their organisation adapt their personal data handling practices without exposing the business to loss."More
Story image
Report: Rushing into cloud migration directly related to security issues
A new report from Radware highlights the impact of COVID-19 on organisations compelled to digitally transform in order to maintain business continuity. More
Story image
Phishing scam imitates SharePoint & OneNote for nefarious clicks
Sophos researchers say that the attackers take a slightly different approach to the standard ‘fake login’ phishing email.More
Story image
Is cyber deception the latest SOC 'game changer'?
Cyber deception reduces data breach costs by more than 51% and Security Operations Centre (SOC) inefficiencies by 32%, according to a new research report by Attivo Networks and Kevin Fiscus of Deceptive Defense.More
Story image
Kaspersky releases new report on consumer’s approach to digital services
COVID-19 related restrictions and the necessity to stay indoors has influenced the way people approach digital services, making them more aware of how securely both they, and their housemates, use the internet.More
Story image
Kaspersky finds red tape biggest barrier against cybersecurity initiatives
The most common obstacles that inhibit or delay the implementation of industrial cybersecurity projects include the inability to stop production (34%), and bureaucratic steps, such as a lengthy approval process (31%) and having too many decision-makers (23%). More