• /
We are sorry you canceled your Premium subscription

You can still enjoy Flaticon Collections with the following limits:

  • You can choose only 3 collections to keep
  • You can only add up to 100 icons per collection
  • You cannot add Premium icons to your collection
The advantages of your collections changed
  • You can choose only 3 collections to keep
  • You can only add up to 100 icons per collection
  • You cannot add Premium icons to your collection

Keep making the most of your icons and collections

Get 20% OFF our
Annual Premium Plan

  • /
Select 3 collections to continue:

You have 8 collections but can only unlock 3 of them

    Stay Premium

    Select a color from the icon

      Choose a new color

      History

        Scale

        Move

        Move left
        Move right
        Move up
        Move down

        Rotate

        Rotate 90º right
        Rotate 90º left

        Flip

        Flip horizontal
        Flip vertical

        Select a shape

        None
        Circle
        Rounded square
        Square

        Size

        Color

        Stroke width

        px
        Undo
        Redo
        Icons Stickers Animated icons Interface icons
        Group by:

        Group search results

        You can group your results by author style, pack, or see all available icons on your screen.

        11,882

        Security encryption Icons - Page 85

        • Binary code
        • Binary code
        • Binary code
        • Binary code
        • Binary code
        • Binary code
        • Binary code
        • Shield
        • Shield
        • Web code
        • Web code
        • Lock
        • Verification
        • Access control
        • Firewall
        • Iterative
        • Phishing
        • Authentication
        • Cloud server
        • Testing
        • Cyber crime
        • Associate
        • Cryptography
        • Access control
        • Cyber crime
        • Access control
        • Envelope
        • Trojan horse
        • Ransomware
        • Password manager
        • Cyber crime
        • Virus attack
        • Phishing
        • Cyber crime
        • Cyber crime
        • Cloud server
        • Ransomware
        • Cyber crime
        • Data Protection
        • Data protection
        • Targeting
        • Virus attack
        • Data protection
        • Virus attack
        • Cryptography
        • Cyber attack
        • Lock
        • Lock
        • Envelope
        • Envelope
        • Chat bubble
        • Data protection
        • Kernel
        • Spider web
        • File
        • File
        • Data protection
        • Cryptography
        • Trojan horse
        • Biometrics
        • Cookies
        • Cyber crimes
        • Trojan horse
        • Spyware
        • Cyber crime
        • Cyber Crime
        • Storage device
        • Antivirus
        • Data protection
        • Data protection
        • Data protection
        • Filtered
        • Dashboards
        • Fake website
        • File
        • File
        • File
        • File
        • File
        • Data protection
        • Password
        • Biometrics
        • Cloud server
        • Decryption
        • Password
        • Cyber attack
        • Virus attack
        • Password
        • Password
        • Biometric identification
        • Spyware
        • Decryption
        • Phishing
        • Spyware
        • Decryption
        • Cryptography
        of 124

        How likely are you to recommend Flaticon to a friend?

        0 1 2 3 4 5 6 7 8 9 10
        Not likely Very likely