Security Tips
How Dashlane’s Bug Bounty Program Helps Us Be More Secure
Dashlane’s bug bounty program incentivizes white-hat hackers to identify bugs in our code to improve security.
How Password Reuse Leads to Cybersecurity Vulnerabilities
Password reuse makes you vulnerable to cyberattacks like brute-force attacks or credential stuffing, which prey on password reuse habits.
What To Do If a Scammer Has Access To Your Email Address
A hacked email account can have serious cybersecurity and privacy consequences. Learn what to do if a scammer has your email address.
How to Export Google Chrome Passwords to a CSV
Follow these steps to export Chrome passwords to a CSV file and consider the benefits of a standalone password manager.
11 Cyber Threats To Be Aware of & Defend Against
Cyber threats can come from both inside and outside an organization and are mitigated through the use of cybersecurity policies and tools.
Digital Identity 101: Everything You Need to Know
Digital identity is making 100 years of physical ID verification obsolete by encompassing cybersecurity practices into online identification.
The 7 Steps of a Cyberattack
Here, we break down the anatomy of cyberattacks and compare outcomes between companies with and without security solutions in place.
How to Find & Manage All Your Online Accounts
How can I find all my online accounts? Here’s the best way to recover all old accounts and keep them safe and accessible.
Top 8 Most Important Passwords to Change
Our most important passwords, like those for email and banking retail accounts, can be protected by safe password habits and a password manager.
How to Prevent Ransomware Attacks on Your Devices
Ransomware is a growing security threat, but we can prevent ransomware by implementing a few cybersecurity tools and best practices.