Breaches & Alerts
Data & Culture
Internet Safety 101
Visit Our Site
5 Quick Tricks to Improve Your Online Security in 5 Minutes
Cybersecurity is an issue that impacts every business and individual, and depends on strong technology systems combined with intelligent habits. But where to begin? It...
How to Run an Effective Phishing Test at Work
Running an effective phishing test at work can be the difference between an employee who clicks on malicious links or attachments and one who reports...
What the Hack Is Juice Jacking?
What might be the only thing more frustrating than getting juice jacked? Being the first documented case of it.
How To Prepare to Lose Your Phone
The new three inevitabilities in modern life are death, taxes, and losing your phone.
What the Hack Is a VPN?
What a VPN does is make you anonymous, mysterious, private—masking your location and your data and your browsing activity.
If You Think Your Personal Information Has Been Stolen, Here’s What to Do
Time matters: the sooner you make moves, the better. Once you receive an alert about a data breach, follow these immediate next steps.
How Safe Is Incognito Mode/Private Browsing, Really?
You might open a new browser window in Incognito Mode and think you’ve just vanished under a cloak of darkness with all your internetting perfectly...
What the Hack Is a Brute Force Attack?
Brute-force attacks are like when you spend five minutes jamming the wrong key into your front door, hoping it might finally work.
Exploring a Safer Future at RSA 2020
Dashlane is once again heading to the RSA Conference, an information security event that connects attendees with industry leaders and innovative technologies (like Dashlane!). This...
What the Hack Is Keylogging?
Imagine your keyboard gossiping behind your back, spilling your deepest, darkest, and most embarrassing secrets to the world.
9 Cybersecurity Podcasts Business Leaders Should Listen To
Make sure you’re aware of the latest security trends in your industry. Podcasts have grown from a niche format to a popular and entertaining media platform...
What the Hack Is a Dead Man’s Switch?
If you want to remember the concept behind dead man’s switch, just think of legendary character actor Joe Morton.
What the Hack Is Malware?
Some viruses are created simply to annoy their hosts. Others scrub your software for data its creators can use or sell for their own gain—and...
Do Biometric Technologies Eliminate the Need for Passwords?
Find out if Face ID and Touch ID will make the world move beyond the password. Face ID. Fingerprint biometrics. Access to a device through...
Protect Your Data When a Third-Party Website Gets Hacked
Learn how to quarantine compromised data when a trusted partner is attacked. When a high-profile data breach occurs, people aren’t necessarily worried about the company...
Can You Trust DNA Companies With Your Data?
It's pretty remarkable that DNA tests are a normal part of life in the 21st century. For a reasonable fee you can learn all about...
Finding My Trail of Logins With Facebook Was a Security Wake-Up Call
Disorganization runs in my family. My dad once lost his car keys by mysteriously leaving them in the fridge, and I misplaced 12 (!) student...
Keeping Your Personal Info Safe While Filing Taxes Online
There’s nothing like that feeling of relief once you’ve finished filing your taxes, and e-filing services like TurboTax and H&R Block definitely ease the pain...
You Should Get a Password Manager
Creating unique passwords guarantees that when an account is breached, no other accounts are affected. The human brain, however, was not built to remember hundreds...
Security Conferences Provide Great Benefits for Business Leaders
Decision-makers need to be up-to-date on the latest cybersecurity risks. Trade shows are an important part of almost every industry. These events provide crucial networking...
A Parent’s Guide to App Permissions: Keeping the Kids Safe and Secure
A recent New York Times investigation revealed the extent to which even children’s locations are tracked by the devices they carry and apps they download....
Telecom’s New Passwordless Login System Raises Questions
ZenKey US carriers are making a foray into the world of passwords and digital identity, joining major tech players like Apple and Google. Verizon, AT&T,...
How to Stop Reusing Passwords for Good
Resetting bad password habits can be a bit of a process. Luckily, Dashlane will help you at every step of the way. Here’s how.
What the Hack Is 2FA?
Adding two-factor authentication to your accounts means that even if someone managed to get your email and password, they wouldn’t be able to log in.