MakeUseOf

Shannon Flynn-

Shannon Flynn

Page 2

About Shannon Flynn

Shannon is located in Philly, PA. She has been writing in the tech field for over 5 years after graduating with a degree in IT. Shannon is the Managing Editor of ReHack Magazine and covers topics like cybersecurity, gaming, and business technology.

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
doctor typing on a laptop besides stethoscope 1
Is HIPAA Privacy a Federal Law?

Learn what the HIPAA Privacy Rule actually covers and how state regulations can impact it.

A 3D image of a brain in blue, purple, and pink ombre 1
LaMDA: Is Google's Sentient AI Real?

Don't let Google's controversial AI fool you.

two women leaning over a wooden table and signing papers 1
How Does an NDA Protect Your Data?

What's the definition of an NDA? What's the difference between an NDA and a confidentiality agreement? Here's what you need to know.

upclose image of a black tesla steering wheel next to a GPS navigation screen 1
Bluejacking: How Bluetooth Can Be Used to Hack Your Devices

Cybercriminals can target you through Bluetooth-enabled devices, from your earphones to fitness trackers, and even your Tesla. Here's how.

An upclose image of a man in a suit holding his tie 1
What Are Anonymized Resumes and Blind CVs? How to Create Them

An anonymous resume/blind CV can help remove bias from the hiring process. Find out what they are and how to create one.

Birth control pack open until the last week with a blue pill next to it 1
Why You Need to Delete Your Period App

Does your period-tracking app keep your data private? And if not, what are the most secure period-tracking services you should try?

a women wearing a striped shirt, sitting in a hanging swing, and using a silver macbook 1
Port Scanning Strategies and How to Close Vulnerable Ports

Learn to close all the vulnerable ports before hackers use port scanning to find network entry points.

An upclose shot of a woman typing on a silver laptop with a blue stethoscope next to it 1
Why You Should Keep Your Health Records Safe

With all these health and telemedicine apps available today, it's of utmost importance to protect your health records.

a boy wearing a red hoodie and headphones doing homwork with his laptop 1
Why Students Are at Risk of Data Breaches (and How to Protect Them)

Educational institutions hold a lot of important data about students, and so they're a big, yet underestimated, target for hackers.

Bitcoin with a lock 1
What Is Digital Asset Security? What Are the Risks Associated With It?

Your digital assets are just as important as your physical assets. But are they as secure as you want them to be?

a man in a plaid shirt on a video call 1
Is Your Health Information Safe on Mental Health Apps?

Did you know that doctor-patient confidentiality doesn't apply to mental health app data? Learn how safe your health information is.

A printed resume for  1
How to Protect Your Resume Information From Scammers

Your resume (or CV) holds a lot of sensitive data about you; so don't be so quick to hand it all over. You could be giving it to scammers.

red dice with NFT written on it on a computer board on hundred dollar bills 1
How NFTs Will Work on Instagram

NFTs are rolling out to Instagram. But how exactly will they be implemented on the platform?

phone screen with a Facebook icon with a red notification icon 1
What Is the Facebook Protect System and How Do You Activate It?

If you want to keep your Facebook account secure, you might be able to try out Facebook Protect. Here's what it is and how to use it.

New features on Telegram 1
Why EU's Interoperability Requirement Threatens Encryption Security

EU's interoperability requirement for messaging apps could potentially weaken the end-to-end encryption you enjoy on top platforms.

blue underwater image with lots of small bubbles 1
What Is Water Cybersecurity?

Water has become the next target for cyberattacks. No, really. Here's everything you need to know about water cybersecurity.

a round white security camera attached to a pole 1
Does Public Service Automation Infringe on Your Privacy?

Many governments already employ artificial intelligence and are investigating further uses. So is AI a threat to your privacy and security?

man in a blue jacket pumping gas in a black car with yellow stripe 1
How Tech Can Help Your Car’s Fuel Economy

Whether gas prices are high or not, saving some extra fuel is always welcome.

two women talking & sitting on chairs with a laptop in between them 1
Mentor vs. Sponsor: What to Know About Each

Find out what the differences between a mentor and a sponsor are, and how to decide which you need.

3D WhatsApp logo tilted against a green background 1
What Is Code Verify for WhatsApp and How Do You Use It?

WhatsApp's Code Verify extension aims to provide an extra layer of protection to your end-to-end encrypted chats on the desktop. Learn how it works.

1 2 3 4 5
Page 2 / 6