Security Tips
How To Prepare to Lose Your Phone
The new three inevitabilities in modern life are death, taxes, and losing your phone.
What the Hack Is a VPN?
What a VPN does is make you anonymous, mysterious, private—masking your location and your data and your browsing activity.
If You Think You’ve Been Hacked, Here’s What to Do
Wondering what to do if you’ve been hacked? Time matters. Follow these immediate next steps.
How Safe Is Incognito Mode/Private Browsing, Really?
You might open a new browser window in Incognito Mode and think you’ve just vanished under a cloak of darkness with all your internetting perfectly hidden from the world. Sorry to burst your bubble, pal, but no. The various “private” options web browsers provide are not a panacea for your privacy concerns. In fact, you […]
What the Hack Is a Brute Force Attack?
Brute-force attacks are like when you spend five minutes jamming the wrong key into your front door, hoping it might finally work.
Exploring a Safer Future at RSA 2020
Dashlane is once again heading to the RSA Conference, an information security event that connects attendees with industry leaders and innovative technologies (like Dashlane!). This year, RSA is humanizing the conversation: “When we recognize that cybersecurity is, fundamentally, about people protecting people, the world becomes a better, more secure place.” Dashlane Booth DetailsWhere: Booth #3130, […]
9 Cybersecurity Podcasts Business Leaders Should Listen To
Make sure you’re aware of the latest security trends in your industry. Podcasts have grown from a niche format to a popular and entertaining media platform for millions of people. Taking a conversational approach to complex issues is extremely useful in many fields. It’s no surprise podcasts based on such complex subjects as law, medicine, […]
What the Hack Is a Dead Man’s Switch?
If you want to remember the concept behind dead man’s switch, just think of legendary character actor Joe Morton.
What the Hack Is Malware?
Some viruses are created simply to annoy their hosts. Others scrub your software for data its creators can use or sell for their own gain—and potentially to your detriment.
Do Biometric Technologies Eliminate the Need for Passwords?
Find out if Face ID and Touch ID will make the world move beyond the password. Face ID. Fingerprint biometrics. Access to a device through detection of typical user patterns. Science fiction has taught entire generations of tech entrepreneurs that the future will be password-free. Many security professionals are happy to call every new authentication […]
Protect Your Data When a Third-Party Website Gets Hacked
Learn how to quarantine compromised data when a trusted partner is attacked. When a high-profile data breach occurs, people aren’t necessarily worried about the company that suffered the breach. Instead, they’re concern is for the end-users of that company’s systems. Those users,customers and employees,are the ones whose sensitive data is at risk. A data breach […]
Can You Trust DNA Companies With Your Data?
It’s pretty remarkable that DNA tests are a normal part of life in the 21st century. For a reasonable fee you can learn all about your ancestry and genetic traits. Of course, mailing saliva to a tech startup so they can analyze your DNA also sounds like a dystopian sci-fi movie. How safe is it […]