A Better Web
Data & Culture
Internet Safety 101
Breaches & Alerts
What the Hack
Visit Our Site
Home Chef One of 11 New Data Breaches Resulting in Millions of User Records for Sale on the Dark Web
Two weeks after Bleeping Computer reported that 8 million user records had been posted to a marketplace on the dark web, Home Chef has confirmed...
9 Million Emails Exposed and 2,000 Credit Cards Stolen in Sophisticated EasyJet Attack
EasyJet first became aware of the attack in January, but only notified the 2,208 customers whose credit card details had been stolen last month.
GoDaddy Hacked: Number of Affected Users Unclear
Following suspicious activity on its servers, GoDaddy investigated and confirmed a breach that occurred on October 19, 2019. It is unclear how many of their...
It’s All Fun & Games Until Someone Gets Hacked: What We Know About the Nintendo Cyberattacks
Details are emerging about cyberattacks against users of Nintendo’s Switch gaming console, specifically those using the Nintendo Switch Online service.
500,000 Zoom Accounts on the Dark Web
Half a million Zoom accounts have ended up on the dark web. Here's what information was exposed and what to do now.
Not Just For Secret Agents and Celebrities: Phone Encryption Explained
The easiest way to think of encryption is that it takes the information on your phone and it translates it into a secret code.
Marriott Breached Again, 5.2 Million Accounts Compromised
On March 31st, Marriott International notified more than 5 million guests that their personal information was compromised due to a vulnerability in the company’s app.
We’re Waiving the First 3 Months of a Dashlane Business Subscription
Internet scammers are on the rise, taking advantage of the fact that home networks usually don’t have the same level of security as corporate networks
What Is the Dark Web?
While the dark web is not all bad, its anonymous nature makes it a great place to buy and sell personal info stolen from data...
What the Hack Is Phishing?
A lump grew in my throat. I’d been conned. More specifically, I’d been phished. And it had nothing to do with the band.
Always Change Your Passwords After a Breach
Even though 91% of people understand it’s a bad idea, 59% still reuse their passwords. This means your compromised passwords are likely being used elsewhere.
Which Apps Actually Need Location Permissions?
In the great pantheon of things our phones know about us, our location data is arguably the most sensitive (ill-advised bathroom selfies notwithstanding). The idea...
5 Quick Tricks to Improve Your Online Security in 5 Minutes
Cybersecurity is an issue that impacts every business and individual, and depends on strong technology systems combined with intelligent habits. But where to begin? It...
How to Run an Effective Phishing Test at Work
Running an effective phishing test at work can be the difference between an employee who clicks on malicious links or attachments and one who reports...
What the Hack Is Juice Jacking?
What might be the only thing more frustrating than getting juice jacked? Being the first documented case of it.
How To Prepare to Lose Your Phone
The new three inevitabilities in modern life are death, taxes, and losing your phone.
What the Hack Is a VPN?
What a VPN does is make you anonymous, mysterious, private—masking your location and your data and your browsing activity.
If You Think Your Personal Information Has Been Stolen, Here’s What to Do
Time matters: the sooner you make moves, the better. Once you receive an alert about a data breach, follow these immediate next steps.
How Safe Is Incognito Mode/Private Browsing, Really?
You might open a new browser window in Incognito Mode and think you’ve just vanished under a cloak of darkness with all your internetting perfectly...
What the Hack Is a Brute Force Attack?
Brute-force attacks are like when you spend five minutes jamming the wrong key into your front door, hoping it might finally work.
Exploring a Safer Future at RSA 2020
Dashlane is once again heading to the RSA Conference, an information security event that connects attendees with industry leaders and innovative technologies (like Dashlane!). This...
What the Hack Is Keylogging?
Imagine your keyboard gossiping behind your back, spilling your deepest, darkest, and most embarrassing secrets to the world.
9 Cybersecurity Podcasts Business Leaders Should Listen To
Make sure you’re aware of the latest security trends in your industry. Podcasts have grown from a niche format to a popular and entertaining media platform...
What the Hack Is a Dead Man’s Switch?
If you want to remember the concept behind dead man’s switch, just think of legendary character actor Joe Morton.