MakeUseOf

Shannon Flynn-

Shannon Flynn

About Shannon Flynn

Shannon is located in Philly, PA. She has been writing in the tech field for over 5 years after graduating with a degree in IT. Shannon is the Managing Editor of ReHack Magazine and covers topics like cybersecurity, gaming, and business technology.

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
chatting to a friend while sat in your bedroom 1
Setting Up Your Child’s First Phone? Tips for Keeping Them Safe

Getting a phone for a child is a big responsibility, and you want to consider every aspect of security to make this milestone a positive experience.

Person using an iPhone 1
Important iPhone Security Features You Don’t Want to Overlook

There are many features baked into your iPhone that can help protect private information, if you know to enable them.

Heart rate monitor device for fitness 1
What Data Do Health and Fitness Devices Collect, and How Much Do They Share?

Activity trackers gather a large amount of information about you, by design. And those data points aren't for your eyes only.

older senior holding silver apple iphone 6 1
The 9 Best iPhone Apps to Help Keep Seniors Safe and Secure

Many senior citizens have discovered that their smartphones are helping to keep track of personal medical information.

An elderly woman's hands clasped in her lap. 1
How to Help Protect Seniors From Scammers

Older adults who didn't grow up with the internet are more likely to fall victim to computer-related scams. Here are some tips to reduce those odds.

person using banking app on smartphone feature 1
4 Reasons All Digital Banking Is Coming Whether We Like It or Not

The humble days of the local bank branch are drawing to a close.

Man's finger pointing at a home outline with a bulb icon 1
Are Smart Homes Safer Homes? How to Make Your House Unhackable

Smart home devices often advertise their safety, but they also come with risk. Here are tips to improve the security of your home using smart gadgets.

big tech company logos feature 1
What Is Big Tech and Why Is the Government Trying to Break It Up?

The Big Five control and influence more than any other business. Is it time to cut them down to size?

chatgpt login screen on smartphone feature 1
Can ChatGPT Replace Me? What Jobs Will Generative AI Replace?

ChatGPT's generative AI is great fun, but it has some folks worried about their jobs.

computer code on screen with hazy blue and purple focus 1
Why Cyberattacks Hit Higher Ed and What You Can Do to Stop Them

With stockpiles of student financial and personal records, a university with weak cyberdefenses can be a hacker's dream come true.

blue and white email logo on home screen 1
Is Your Business Email Secure, and Who Is Able to Read Your Messages?

Which type of business conversations are more at risk—email or instant messaging? Bosses and hackers alike can get access to both.

a man working on his laptop sitting by the window 1
How to Create Your Own Online Proxy Server in Minutes

It's easier than you think to get your own proxy server up and running. Here's everything you need to know.

data security password login 1
Should You Say Goodbye to Passwords in 2023?

Passwords can be stolen, and it's a hassle to remember them all. Is it possible yet to do without passwords entirely?

grayscale united states capital roof dome 1
What Is the Biden Administration 2023 National Cybersecurity Strategy?

The White House Office of the National Cyber Director is issuing a new cybersecurity strategy. So what is it? And why?

unlocked phone showing 5g on homescreen corner 1
5G
6 5G Security Risks You Need to Know About

5G technology is being rapidly adopted by consumers and businesses across the country. Explore emerging security pitfalls and possible safeguards.

a laptop and multiple credit cards scattered on a red shaggy carpet 1
What Security Safeguards Should You Use When Paying Bills Online?

Paying bills or making e-commerce payments online? Here are five things you should bear in mind to reduce the risk of falling prey to scammers.

a hand holding a Samsung phone with the Google Play store on it 1
What Is Google Play Data and Where Is It Stored?

Google Play collects data about you, but where? Is it really secure? And how does Google Play Services also store your private information?

hacker in black hoodie and mask in front of a laptop pointing at the camera 1
Your Server Can Be Hacked: Here’s How

How are servers hacked? How can you tell if a server has been hit by cybercriminals? Here's what you need to know.

An upclose image of the back of a student's head while he's in school 1
How Can We Protect Teachers From Cyberattacks?

Cybercrime has impacted not only students but also teachers in recent years. So, what can educational institutions do about it?

person-holds-white-bluetooth-earbuds-in-hands 1
Bluejacking vs. Bluebugging vs. Bluesnarfing: What's the Difference?

Your devices are open to Bluetooth attacks, but what do the three main Bluetooth attack types actually mean? How can you stay safe?

1 2 3 4 5
Page 1 / 6