Breaches & Alerts
Data & Culture
Internet Safety 101
Product News & Tips
Visit Our Site
Twitter’s 200 Million-User Email Leak: What to Know and How to Protect Your Info
Here's what Twitter's significant security breach means for 200 million users and what you can do if you were affected.
Cyber Threats: Your Guide to Common Terms
This glossary of key terms will help you get a handle on what to watch out for when it comes to cyber threats and attacks.
Don’t Get Hooked: Dashlane Celebrates “No Phishing Day”
In honor of Go Fishing Day on June 18th, we're celebrating (and inventing) No Phishing Day by giving you a few quick tips on how...
Why Colleges and Universities Need a Password Manager
Here's why every college and university needs to protect themselves with a password manager.
Traveling Soon? Add These 5 Cybersecurity Essentials to Your Packing List.
With wider vaccine availability and country borders opening up, many of us are packing our bags. Here’s why you shouldn’t leave cybersecurity at home.
You Asked, A Hacker Answered: 7 Questions With Rachel Tobac
Social engineering expert and white-hat hacker Rachel Tobac tells us just how cautious we should be online.
What’s Your Number? How to Avoid Port-Out Scams.
Hackers can use your cell phone number for a cyberattack known as a port-out scam. Here’s how they work and how you can protect yourself.
Create a Culture of Cybersecurity: Teach Employees to “Catch a Phish”
At the end of the day, negative emotions won’t help you build an effective culture of cybersecurity awareness. HR departments should make it their goal...
Cybersecurity Journalist Nicole Perlroth on How to Protect Your Data Amid a Global Cyber Arms Race
The New York Times journalist and author of "This Is How They Tell Me The World Ends" shares her predictions for the future and life-saving...
What You Can Learn About Cybersecurity From Snooping on Your Crush Online
We may not be proud of it, but most of us have creeped on a crush or ex online when curiosity got the best of...
New Attacks Targeting Remote Workers, Recent CISA Analysis Reveals
The shift to remote work has forced companies to change how they think about their security. CISA recently published a report highlighting an increase in...
How to Run an Effective Phishing Test at Work
Running an effective phishing test at work can be the difference between an employee who clicks on malicious links or attachments and one who reports...
Keeping Your Personal Info Safe While Filing Taxes Online
There’s nothing like that feeling of relief once you’ve finished filing your taxes, and e-filing services like TurboTax and H&R Block definitely ease the pain...
How to Spot a Phishing Scam
Sometimes it's obvious. That message from a Nigerian prince requesting you wire $2,000? Ok, probably not going to fall for that one. If the CEO...
4 Cyber Threats Targeting Small Businesses in 2017
It’s too dangerous for organizations of all sizes to put the issue of cybersecurity on the backburner in 2017. One study found that small businesses...
Naughty or Nice? Here’s How to Tell If an E-Commerce Website is Legit
We all want to find the sweetest deal on best name-brand clothes, sleek new toys, and the hottest tech gadgets on the market. But do...
Password Managers are a Top Cyber Security Tool for Critical Infrastructure Systems
A cyber security researcher on a jet hacks into flight controls via its in-flight information system. A practical joker cracks the code for programming electronic...
DDoS Attacks Are Crippling Twitter, Amazon, and Reddit. Here’s How.
Updated 10/24/2016 On Friday, October 21, Twitter, Spotify, Reddit, AirBnb, Github, and several major websites reported outages due to a Distributed Denial of Service attack...