Most Recent Posts

What the Hack Is Juice Jacking?
What might be the only thing more frustrating than getting juice jacked? Being the first documented case of it.

How To Prepare to Lose Your Phone
The new three inevitabilities in modern life are death, taxes, and losing your phone.

What the Hack Is a VPN?
What a VPN does is make you anonymous, mysterious, private—masking your location and your data and your browsing activity.

Dashlane’s Got Talent
On the Dashlane blog, you can read interesting articles on topics such as our recent rebranding, the engineering recruitment process, and even very technical yet fascinating posts about our choice of technology. And although you might gain an idea of how we work at Dashlane after reading them, there’s something missing: What about life at Dashlane? What does it mean to be […]

If You Think You’ve Been Hacked, Here’s What to Do
Wondering what to do if you’ve been hacked? Time matters. Follow these immediate next steps.

How Safe Is Incognito Mode/Private Browsing, Really?
You might open a new browser window in Incognito Mode and think you’ve just vanished under a cloak of darkness with all your internetting perfectly hidden from the world. Sorry to burst your bubble, pal, but no. The various “private” options web browsers provide are not a panacea for your privacy concerns. In fact, you […]

What the Hack Is a Brute Force Attack?
Brute-force attacks are like when you spend five minutes jamming the wrong key into your front door, hoping it might finally work.

Exploring a Safer Future at RSA 2020
Dashlane is once again heading to the RSA Conference, an information security event that connects attendees with industry leaders and innovative technologies (like Dashlane!). This year, RSA is humanizing the conversation: “When we recognize that cybersecurity is, fundamentally, about people protecting people, the world becomes a better, more secure place.” Dashlane Booth DetailsWhere: Booth #3130, […]

Contributing to Free Open Source Projects
Here we explore some possibilities for companies to support FOSS projects and the benefits of doing so.

A Closer Look at Loretta: Big Tech’s Big Game Commercials
Viewed through the reality of surveillance capitalism, Big Tech’s commercials last Sunday take on a new light.

9 Cybersecurity Podcasts Business Leaders Should Listen To
Make sure you’re aware of the latest security trends in your industry. Podcasts have grown from a niche format to a popular and entertaining media platform for millions of people. Taking a conversational approach to complex issues is extremely useful in many fields. It’s no surprise podcasts based on such complex subjects as law, medicine, […]