Blog
Recent

Shireen Stephenson

Cybersecurity Writer

Shireen has an eclectic background in education and digital marketing. She is CompTIA Security+-certified, is CC-certified, and is an ISC2 member in good standing. A security enthusiast, she regularly participates in ISC2 events to understand how proactive and defensive techniques are applied to real-world scenarios. This participation allows her to bring you the latest in cybersecurity trends, tools, and techniques on the LastPass blog.

Shireen Stephenson
Cover Image for Undercover Bytes: Packet Sniffing in Cyber Espionage
Cybersecurity
Undercover Bytes: Packet Sniffing in Cyber Espionage
October 17, 2025 • By Shireen Stephenson
Cover Image for The Rise and Reign of Computer Worms: Inside the Battle for Control
Cybersecurity
The Rise and Reign of Computer Worms: Inside the Battle for Control
October 15, 2025 • By Shireen Stephenson
Cover Image for Juice Jacking in 2025: Want a Side of Malware with That Free Charge?
Cybersecurity
Juice Jacking in 2025: Want a Side of Malware with That Free Charge?
October 09, 2025 • By Shireen Stephenson
Cover Image for How the Hunt for Markus Hess Launched Today’s Data Exfiltration Defenses
Cybersecurity
How the Hunt for Markus Hess Launched Today’s Data Exfiltration Defenses
October 07, 2025 • By Shireen Stephenson
Cover Image for What Is IP Spoofing, and Is It Still Happening in 2025?
Cybersecurity
What Is IP Spoofing, and Is It Still Happening in 2025?
October 01, 2025 • By Shireen Stephenson
Cover Image for DNS Spoofing Attacks in 2025: What You Need to Know and How you Can Stop Them
Cybersecurity
DNS Spoofing Attacks in 2025: What You Need to Know and How you Can Stop Them
September 26, 2025 • By Shireen Stephenson
Cover Image for How to Protect Yourself from Malvertising in 2025 (Before It Costs You Everything)
Cybersecurity
How to Protect Yourself from Malvertising in 2025 (Before It Costs You Everything)
September 25, 2025 • By Shireen Stephenson
Cover Image for Supply Chain Attacks: How Attackers Target the Platforms You Trust and What You Can Do About It
Cybersecurity
Supply Chain Attacks: How Attackers Target the Platforms You Trust and What You Can Do About It
September 24, 2025 • By Shireen Stephenson
Cover Image for Still Using Windows 10? Here's How to Reset Your Windows 10 Password Like a Pro
Tips And Tricks
Still Using Windows 10? Here's How to Reset Your Windows 10 Password Like a Pro
September 23, 2025 • By Shireen Stephenson
Cover Image for Is Your Digital identity Safe from AI-Driven Attacks or Already in the Wrong Hands?
Cybersecurity
Is Your Digital identity Safe from AI-Driven Attacks or Already in the Wrong Hands?
September 19, 2025 • By Shireen Stephenson
Cover Image for Cross Site Scripting Attacks: Could They Empty Your Wallet Without You Even Knowing It?
Cybersecurity
Cross Site Scripting Attacks: Could They Empty Your Wallet Without You Even Knowing It?
September 18, 2025 • By Shireen Stephenson
Cover Image for The Simple Steps to Resetting Your Spectrum Account, Router, and Wi-Fi Passwords Like a Pro
Tips And Tricks
The Simple Steps to Resetting Your Spectrum Account, Router, and Wi-Fi Passwords Like a Pro
September 16, 2025 • By Shireen Stephenson