A Better Web
Data & Culture
Internet Safety 101
Breaches & Alerts
What the Hack
Visit Our Site
College Contact Tracing Apps Are Leaking Student Data
In an effort to keep students and the greater public safe during the pandemic, some colleges forget to factor in students’ privacy.
What Is Credential Stuffing?
How do hackers get their hands on passwords in the first place and how are they then used in credential stuffing attacks? We explain.
How Dashlane Helped KHM Travel Fix their Password Problems and Build a Culture of Security Awareness
KHM Travel needed a safe, secure way to manage and share passwords. Dashlane saved them time and delivered peace of mind.
How To Wipe Your Work Computer
Here’s how to ensure your device is clear of personal data before giving it back to your company. Try as I might to keep my...
Is TikTok Safe for Kids?
Home to many a dance challenge, TikTok is social currency for Gen-Z. Here’s everything parents should know about the wildly trendy app that most of...
Why Do You Need a VPN? Don’t Miss These 3 Key Benefits
Pointing to national security concerns, President Trump's recent executive order threatens to ban TikTok if it's not sold by the Chinese-owned company. Although Microsoft, Twitter,...
Which Apps Actually Need Location Permissions?
In the great pantheon of things our phones know about us, our location data is arguably the most sensitive (ill-advised bathroom selfies notwithstanding). The idea...
Over 250,000 Instacart Users’ Personal Data for Sale on the Dark Web
Instacart denies their systems have been breached, so what happened and what should you do now? We break it down.
Dark Web Monitoring—Your Employees Are Likely Using Compromised Passwords
Think your enterprise password policy is keeping your organization secure from attack? Think again.
Twitter Suffers Unprecedented Attack Affecting Accounts from President Barack Obama to Kim Kardashian
In the worst security breach in the history of the company, multiple high-profile Twitter accounts—including President Barack Obama, Joe Biden, Elon Musk, Kanye West, and...
How Can I Instill Good Internet Security Habits in My Kids?
Now that many schools are operating virtually, it’s the perfect time to evaluate your kids’ understanding and awareness of digital privacy, and brush up on...
Almost 30 Million LiveJournal Accounts Compromised, Sold on Dark Web
In 2014, LiveJournal suffered a security breach, which compromised 26+ million user credentials. The breach was not reported, and it appears these credentials have been...
Home Chef One of 11 New Data Breaches Resulting in Millions of User Records for Sale on the Dark Web
Two weeks after Bleeping Computer reported that 8 million user records had been posted to a marketplace on the dark web, Home Chef has confirmed...
9 Million Emails Exposed and 2,000 Credit Cards Stolen in Sophisticated EasyJet Attack
EasyJet first became aware of the attack in January, but only notified the 2,208 customers whose credit card details had been stolen last month.
GoDaddy Hacked: Number of Affected Users Unclear
Following suspicious activity on its servers, GoDaddy investigated and confirmed a breach that occurred on October 19, 2019. It is unclear how many of their...
It’s All Fun & Games Until Someone Gets Hacked: What We Know About the Nintendo Cyberattacks
Details are emerging about cyberattacks against users of Nintendo’s Switch gaming console, specifically those using the Nintendo Switch Online service.
500,000 Zoom Accounts on the Dark Web
Half a million Zoom accounts have ended up on the dark web. Here's what information was exposed and what to do now.
Not Just For Secret Agents and Celebrities: Phone Encryption Explained
The easiest way to think of encryption is that it takes the information on your phone and it translates it into a secret code.
Marriott Breached Again, 5.2 Million Accounts Compromised
On March 31st, Marriott International notified more than 5 million guests that their personal information was compromised due to a vulnerability in the company’s app.
What Is the Dark Web?
While the dark web is not all bad, its anonymous nature makes it a great place to buy and sell personal info stolen from data...
What the Hack Is Phishing?
A lump grew in my throat. I’d been conned. More specifically, I’d been phished. And it had nothing to do with the band.
Always Change Your Passwords After a Breach
Even though 91% of people understand it’s a bad idea, 59% still reuse their passwords. This means your compromised passwords are likely being used elsewhere.
5 Quick Tricks to Improve Your Online Security in 5 Minutes
Cybersecurity is an issue that impacts every business and individual, and depends on strong technology systems combined with intelligent habits. But where to begin? It...
How to Run an Effective Phishing Test at Work
Running an effective phishing test at work can be the difference between an employee who clicks on malicious links or attachments and one who reports...