We are very delighted to release Enpass 5.0 for Windows with its most awaited feature ever: The Browser Extensions. Its really a dream come true and moment of celebration for us. We feel that now in real sense, Enpass has now become a complete password management solution. Now say bye-bye to tedious copy/paste and manual […]
Enpass for Apple Watch. Now get your passwords on your wrist!
With Apple Watch, the technological revolution in wearables has gained a new pace and we believe in keeping pace with the advancements in technology. So, here we are bringing forward your very own Password Manager for your latest gadget Apple Watch. There is one thing noticeable about Apple watch, the more you wear it, the […]
Enpass 4.6 for Android: Got tastier with Samsung Fingerprint scanner and more.
Its really the happiest moment for us watching Enpass to grow up like a kid. We nurture it, groom it to make it shine as one of the best cross-platform password manager. No matters how tough and long this voyage is with lot of things to do, but we are zealous sailors working really hard […]
Oh, so you love ownCloud, Now Enpass too.
When you are on a mission to serve for large community with the best possible you can give, you have to face a huge appetite for novelties. The same happened to us when we launched Enpass for Linux in February. We start getting lot of feature requests for implementing ownCloud/WebDAV support for sync and the […]
Released Enpass for Modern Windows 8.1
Cheer up Modern Windows users!! On your frequent request, we have released Native Enpass App for Windows 8.1 and is now available on Windows Store. It is a paid App worth 9.99$ with a free trial. All features are unlocked in trial version except the only limitation of storage limit i.e. for trial purpose you […]
The FREAK Flaw: Another Security threat
On Tuesday, March 3, 2015, researchers discovered another major security flaw in the world of Internet and that too in its backbone i.e. SSL/TLS security protocol. The vulnerability was named as FREAK attack. It can be used by an attacker to intercept HTTPS connections and steal sensitive information. Who is affected with this? Both server […]