This post is also available in: French, German, Portuguese (Brazil)

Making security simple for people and businesses everywhere

Resources, digital security tips, and product news from your expert cybersecurity partners at Dashlane

Most Recent Posts

Learn how to make sure your Chrome extensions are safe. Spot suspicious extensions, safely remove them, and replace them with safer options.

Password security best practices, including strong password creation and 2FA, create good password hygiene habits and protect your data.

At Dashlane, we use Machine Learning Models to classify HTML fields’ categories (for example, username, email, address, and so on)…

Are private browsers really private? Although they can delete cookies and browsing history, private browsers have some limitations.

If you want proper code organization for your iOS or macOS app in 2023, consider Swift packages: reusable components of…

Autofill is a great time saver, but what if you need to edit or delete your saved passwords? Learn how to find saved passwords on an iPhone.

Workplace Tips

With more employees working remotely, changing passwords can improve security, but only in certain instances.

A company-wide password manager is one of the most useful cybersecurity tools. Here’s how to make the launch faster and more effective.

A small business cybersecurity plan details how to protect an organization from cyber threats, including using password managers to safeguard company data.

Learn more about the fundamentals of cybersecurity from AES to zero trust with this helpful glossary and downloadable guide.

Learn how password practices have evolved and what to do to protect your organization.

This glossary of key terms will help you get a handle on what to watch out for when it comes to cyber threats and attacks.

What the Hack

Phishing attempt with fishing lure

A lump grew in my throat. I’d been conned. More specifically, I’d been phished. And it had nothing to do with the band.

Juice jacking USB devices

What might be the only thing more frustrating than getting juice jacked? Being the first documented case of it.

Internet user disguised while using VPN

What a VPN does is make you anonymous, mysterious, private—masking your location and your data and your browsing activity.

Laptop experiencing a brute force attack

Brute-force attacks are like when you spend five minutes jamming the wrong key into your front door, hoping it might finally work.

Camera focusing on keyboard

Imagine your keyboard gossiping behind your back, spilling your deepest, darkest, and most embarrassing secrets to the world.

""

If you want to remember the concept behind dead man’s switch, just think of legendary character actor Joe Morton.