Blog
Recent
bg
Subscribe & Save 20% off Premium or Families plans

By subscribing, you agree to receive marketing communications regarding industry news and research, educational resources, and LastPass products and services. The processing of your personal data in accordance with the LastPass Privacy Policy. You can unsubscribe from marketing communications at any time.

Browse articles
Cover Image for Will 2025 Be the Year You Learn What Honeywords Are, and Why Attackers Hate Them?
Cybersecurity
Will 2025 Be the Year You Learn What Honeywords Are, and Why Attackers Hate Them?
October 28, 2025 • By Shireen Stephenson
Cover Image for What Is Browser Hijacking and Why Your Search Results Can’t Be Trusted
Cybersecurity
What Is Browser Hijacking and Why Your Search Results Can’t Be Trusted
October 22, 2025 • By Shireen Stephenson
Cover Image for Undercover Bytes: Packet Sniffing in Cyber Espionage
Cybersecurity
Undercover Bytes: Packet Sniffing in Cyber Espionage
October 17, 2025 • By Shireen Stephenson
Cover Image for The Rise and Reign of Computer Worms: Inside the Battle for Control
Cybersecurity
The Rise and Reign of Computer Worms: Inside the Battle for Control
October 15, 2025 • By Shireen Stephenson
Cover Image for Juice Jacking in 2025: Want a Side of Malware with That Free Charge?
Cybersecurity
Juice Jacking in 2025: Want a Side of Malware with That Free Charge?
October 09, 2025 • By Shireen Stephenson
Cover Image for How the Hunt for Markus Hess Launched Today’s Data Exfiltration Defenses
Cybersecurity
How the Hunt for Markus Hess Launched Today’s Data Exfiltration Defenses
October 07, 2025 • By Shireen Stephenson
Cover Image for What Is IP Spoofing, and Is It Still Happening in 2025?
Cybersecurity
What Is IP Spoofing, and Is It Still Happening in 2025?
October 01, 2025 • By Shireen Stephenson
Cover Image for DNS Spoofing Attacks in 2025: What You Need to Know and How you Can Stop Them
Cybersecurity
DNS Spoofing Attacks in 2025: What You Need to Know and How you Can Stop Them
September 26, 2025 • By Shireen Stephenson
Cover Image for How to Protect Yourself from Malvertising in 2025 (Before It Costs You Everything)
Cybersecurity
How to Protect Yourself from Malvertising in 2025 (Before It Costs You Everything)
September 25, 2025 • By Shireen Stephenson
Cover Image for Supply Chain Attacks: How Attackers Target the Platforms You Trust and What You Can Do About It
Cybersecurity
Supply Chain Attacks: How Attackers Target the Platforms You Trust and What You Can Do About It
September 24, 2025 • By Shireen Stephenson
Cover Image for Is Your Digital identity Safe from AI-Driven Attacks or Already in the Wrong Hands?
Cybersecurity
Is Your Digital identity Safe from AI-Driven Attacks or Already in the Wrong Hands?
September 19, 2025 • By Shireen Stephenson
Cover Image for Cross Site Scripting Attacks: Could They Empty Your Wallet Without You Even Knowing It?
Cybersecurity
Cross Site Scripting Attacks: Could They Empty Your Wallet Without You Even Knowing It?
September 18, 2025 • By Shireen Stephenson