About Shannon Flynn
Shannon is located in Philly, PA. She has been writing in the tech field for over 5 years after graduating with a degree in IT. Shannon is the Managing Editor of ReHack Magazine and covers topics like cybersecurity, gaming, and business technology.
3 Ways to Stop Your Phone From Being Tracked
Your smartphone can be used to track you in many ways, but you can keep this to a minimum if you're diligent. Here, we'll teach you how.
Are No-Code and Low-Code Development Platforms Secure?
No- or low-code environments are great for businesses with little tech expertise, but are they really safe for you to use?
Everything You Need to Know About Gmail’s Login Security Warning Alerts
Google's login security alerts in Gmail can be pretty annoying, but is it a good idea to try and disable them? Let's dive in and find out.
How Can You Prevent Formjacking?
Formjacking is a dangerous cyberattack that can result in financial loss and identity theft. So what is formjacking and how can you stay safe?
Why You Should Be Wary of Crypto on Social Media
Scammers are luring victims using crypto on social media. Here's why you should be careful before making investments and how you can stay protected.
What Are the Pros and Cons of Passwordless Authentication?
You might already be using passwordless authentication on some services. But what are the risks and benefits of a password-free society?
What Is Synthetic Identity Fraud?
Cybercriminals don't need to know everything about you to commit fraud. Here's how to prevent and report synthetic fraud.
What Is the NATO Cyber Defence Pledge and What Does It Mean for You?
You might've heard about the cybersecurity guidelines issued by NATO, but what actually is the Cyber Defence Pledge?
Scammers Are Using Fake COVID Sites to Obtain Your Data
Looking for free testing kits? Or searching for info about coronavirus? Watch out for fake websites that steal your personal information instead.
Sideloading: Why Installing Unofficial Apps May Put You at Risk
Can't find the app you're looking for on official app stores? You might be tempted to sideload content. Here's why you shouldn't.
How Does Law Enforcement Use Data to Solve Crime?
Data can form an important part of solving crimes, but how exactly is it used?
How Ethical Hacking Can Stop Hackers
Ethical hacking is a method companies can use to beat hackers at their own game. Let's explore ethical hacking and how you can get involved in it.
What Are the 5 Steps of Ethical Hacking?
Ethical hacking is not a contradiction; some people use their evil-genius skills to help improve security, and here’s how they do it.
How Predictive Analytics Can Combat Cybercrime
We may not be quite ready to tackle pre-crime in the physical world, but when it comes to cyber criminals, AI is making waves.
What Is Cyberflashing? Is It Illegal?
Cyberflashing is a form of online abuse that is becoming increasingly common. From its legality to how you can avoid it, here's all you need to know.
All of Your Messaging App Metadata the FBI Claims It Can Obtain
If you think any information you share over messaging apps is 100% private, you might want to reconsider that.
How Will Web 3.0 Change Internet Privacy?
Web 3.0, the next generation of the internet is just around the corner. Here, we'll explain how it could change your online privacy forever.
Beaconing 101: What Is Beaconing in Security?
Beaconing is one of the first signs of a cyberattack. Here's everything you need to know.
Should You File a Claim in a Data Breach Settlement?
Data breaches are serious, but is it worth filing a claim?
What Is Geofencing and How Does It Affect Your Security and Privacy?
Ever wondered how advertisers send location-specific pop-ups? Or how smart cars can detect theft? Here's what you need to know about geofencing.