bg-team-02
It's no secret, most of us are really bad at passwords. If you can remember your passwords then you are probably doing it wrong. If you can't remember your passwords then you are probably trusting a software password manager to do it for you....
Is the entire password strategy flawed? The short answer - YES!
Read more
bg-services-02
This release addresses issues and introduces two new features. It is recommended for all users to update OnlyKey firmware to this version. Instructions for loading OnlyKey firmware can be found in the "Loading OnlyKey Firmware" section of the Quick S...
New OnlyKey Firmware Release Beta 2
Read more
bg-team-01
I have noticed that attackers often still use MS Office Macros in spear phishing attacks. They send out emails like a request for payment on an invoice and attach a word document to the email called invoice.doc. When a user opens the document and ena...
Hacking Macro Malware – The Hunter becomes the prey
Read more
bg-office-01
Gatekeeper is Apple’s anti-malware feature built into OS X that is designed to keep untrusted and malicious applications from running.  With Gatekeepers typical setting, if a user tries to open an application that is not signed with an Apple-recog...
Macrosploit - Bypassing Gatekeeper in OS X (part1)
Read more
bg-office-02
I have been wondering about password managers for a while and have been too paranoid to use them. The reason being that with a password manager all of your passwords are stored in one place. Once false move (Click the wrong link or open the wrong att...
Password managers - convenient for you or for an attacker? LastPass two-factor authentication bypass
Read more

Products

We build innovative security products like OnlyKey

Products

OnlyKey (International Version)

$46


  • Physical Security Features

  • Military Grade Encryption

  • Password Manager w/Basic Two Factor Authentication

  • Self-Destruct Feature

  • Plausible Deniability Feature

  • Ships internationally


NOTE: The only difference between the U.S. Version and the International Version is the firmware loaded. Instructions on how to load your own firmware is provided in the quick start guide.






See The Kickstarter Project That Started It All!

Kickstarter Project



 

Our security services.

Security Architecture Review

CryptoTrust has the right tools and expertise to provide an independent evaluation that will help you identify any security gaps you may have before an attacker does.


Vulnerability Assessment

It is constant challenge for organizations to assess and prioritize information security vulnerabilities. We provide a prioritized checklist of findings to simplify remediation.


Penetration Testing

A penetration test does not stop at simply uncovering vulnerabilities. Our penetration testing methodology simulates a real world attack and is based on industry standard NIST SP 800-115.


Consulting

CryptoTrust’s professionals understand that there is no magic bullet when it comes to security. Only through a well designed and well tested security architecture using a defense in depth methodology can a robust security posture be attained.