8 of the Most Common Ways Hackers Steal Passwords
How do hackers get passwords? As hacking tactics like spyware, phishing, and man-in-the-middle attacks evolve, protection methods improve.
Password Psychology: How to Create Safe Passwords at Work
Password psychology uncovers how personality types and habits drive our password behavior and can make or break our online security profiles.
A Guide To External Security Threats in 2023
External security threats that include hacking, malware, and data theft can be addressed with cybersecurity best practices and tools.
11 Cyber Threats To Be Aware of & Defend Against
Cyber threats can come from both inside and outside an organization and are mitigated through the use of cybersecurity policies and tools.
Cyber Threats: Your Guide to Common Terms
This glossary of key terms will help you get a handle on what to watch out for when it comes to cyber threats and attacks.
Everything You Need to Know about WannaCry Ransomware and How to Keep Your Accounts Safe
Updated: 5/30/2017 [Update] A massive ransomware attack affected thousands of schools, hospitals, and other organizations in more than 150 countries. In a recent blog post, researchers at Kryptos Logic argue that approximately 727,000 unique IP addresses were WannaCry victims and “that the real number of affected systems, by assessing the sinkhole data, is in the millions, […]
4 Cyber Threats Targeting Small Businesses in 2017
It’s too dangerous for organizations of all sizes to put the issue of cybersecurity on the backburner in 2017. One study found that small businesses making $100,000 incurred a total security incident cost of $24,000 on average—nearly a quarter of annual earnings. By comparison, the cost for billion-dollar enterprises amounted to less than 0.1% of […]
Dashlane Security Meetup: Discussing Malware and House Intercom Attacks
Last Thursday, we hosted the Paris Security Meetup in the Dashlane Office in Paris. 40 guests joined us for 2 discussions: The first was related to the investigation of a password-stealing malware. It was a very interesting step-by-step analysis of how malware programs operate. The second was around house intercoms. We discussed how new models of intercoms that […]
Naughty or Nice? Here’s How to Tell If an E-Commerce Website is Legit
We all want to find the sweetest deal on best name-brand clothes, sleek new toys, and the hottest tech gadgets on the market. But do you really know if that online shopping website is just selling you a bag of coal? According to Forbes, retailers are projecting that online fraud attempts will increase 43 percent […]