About Shannon Flynn
Shannon is located in Philly, PA. She has been writing in the tech field for over 5 years after graduating with a degree in IT. Shannon is the Managing Editor of ReHack Magazine and covers topics like cybersecurity, gaming, and business technology.
Setting Up Your Child’s First Phone? Tips for Keeping Them Safe
Getting a phone for a child is a big responsibility, and you want to consider every aspect of security to make this milestone a positive experience.
Important iPhone Security Features You Don’t Want to Overlook
There are many features baked into your iPhone that can help protect private information, if you know to enable them.
What Data Do Health and Fitness Devices Collect, and How Much Do They Share?
Activity trackers gather a large amount of information about you, by design. And those data points aren't for your eyes only.
The 9 Best iPhone Apps to Help Keep Seniors Safe and Secure
Many senior citizens have discovered that their smartphones are helping to keep track of personal medical information.
How to Help Protect Seniors From Scammers
Older adults who didn't grow up with the internet are more likely to fall victim to computer-related scams. Here are some tips to reduce those odds.
4 Reasons All Digital Banking Is Coming Whether We Like It or Not
The humble days of the local bank branch are drawing to a close.
Are Smart Homes Safer Homes? How to Make Your House Unhackable
Smart home devices often advertise their safety, but they also come with risk. Here are tips to improve the security of your home using smart gadgets.
What Is Big Tech and Why Is the Government Trying to Break It Up?
The Big Five control and influence more than any other business. Is it time to cut them down to size?
Can ChatGPT Replace Me? What Jobs Will Generative AI Replace?
ChatGPT's generative AI is great fun, but it has some folks worried about their jobs.
Why Cyberattacks Hit Higher Ed and What You Can Do to Stop Them
With stockpiles of student financial and personal records, a university with weak cyberdefenses can be a hacker's dream come true.
Is Your Business Email Secure, and Who Is Able to Read Your Messages?
Which type of business conversations are more at risk—email or instant messaging? Bosses and hackers alike can get access to both.
How to Create Your Own Online Proxy Server in Minutes
It's easier than you think to get your own proxy server up and running. Here's everything you need to know.
Should You Say Goodbye to Passwords in 2023?
Passwords can be stolen, and it's a hassle to remember them all. Is it possible yet to do without passwords entirely?
What Is the Biden Administration 2023 National Cybersecurity Strategy?
The White House Office of the National Cyber Director is issuing a new cybersecurity strategy. So what is it? And why?
6 5G Security Risks You Need to Know About
5G technology is being rapidly adopted by consumers and businesses across the country. Explore emerging security pitfalls and possible safeguards.
What Security Safeguards Should You Use When Paying Bills Online?
Paying bills or making e-commerce payments online? Here are five things you should bear in mind to reduce the risk of falling prey to scammers.
What Is Google Play Data and Where Is It Stored?
Google Play collects data about you, but where? Is it really secure? And how does Google Play Services also store your private information?
Your Server Can Be Hacked: Here’s How
How are servers hacked? How can you tell if a server has been hit by cybercriminals? Here's what you need to know.
How Can We Protect Teachers From Cyberattacks?
Cybercrime has impacted not only students but also teachers in recent years. So, what can educational institutions do about it?
Bluejacking vs. Bluebugging vs. Bluesnarfing: What's the Difference?
Your devices are open to Bluetooth attacks, but what do the three main Bluetooth attack types actually mean? How can you stay safe?